Skip to main navigation
Skip to search
Skip to main content
Lund University Home
English
Svenska
Home
Profiles
Research output
Projects
Units
Infrastructure
Activities
Prizes and Distinction
Search by expertise, name or affiliation
Efficient Security Protocols for Constrained Devices
Martin Gunnarsson
Networks and Security
Department of Automatic Control
LTH Profile Area: AI and Digitalization
Research output
:
Thesis
›
Doctoral Thesis (compilation)
466
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Efficient Security Protocols for Constrained Devices'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Cyber
100%
Security protocols
100%
Constrained Device
100%
Internet
42%
Threat
28%
Cyber Attack
28%
Industrial Control System
28%
Connected Device
28%
Digital Twin
28%
Protocol Verification
28%
Protection
14%
Message
14%
Cyber Physical Systems
14%
Complex Task
14%
Attack
14%
Wireless Sensor Network
14%
Security Mechanism
14%
Hackers
14%
Overloading
14%
Organizational Measure
14%