Nome |
# |
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c92e-3465-fcf8-e053-d805fe0aa794
|
287
|
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-ab2b-fcf8-e053-d805fe0aa794
|
173
|
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67c-fcf8-e053-d805fe0aa794
|
113
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-a769-fcf8-e053-d805fe0aa794
|
82
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-962a-fcf8-e053-d805fe0aa794
|
49
|
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c930-9690-fcf8-e053-d805fe0aa794
|
49
|
BRUSCHETTA: An IoT blockchain-based framework for certifying extra virgin olive oil supply chain, file e0d6c930-a38d-fcf8-e053-d805fe0aa794
|
32
|
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9205-fcf8-e053-d805fe0aa794
|
31
|
On Designing Resilient Location-Privacy Obfuscators, file e0d6c930-acc6-fcf8-e053-d805fe0aa794
|
23
|
A uniformity-based approach to location privacy, file e0d6c930-7d32-fcf8-e053-d805fe0aa794
|
22
|
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-b815-fcf8-e053-d805fe0aa794
|
22
|
An implementation and evaluation of the security features of RPL, file e0d6c931-0a80-fcf8-e053-d805fe0aa794
|
21
|
HUMsim: A Privacy-Oriented Human Mobility Simulator, file e0d6c930-2f40-fcf8-e053-d805fe0aa794
|
20
|
Indirect Revocable KP-ABE with Revocation Undoing Resistance, file e0d6c931-142a-fcf8-e053-d805fe0aa794
|
18
|
Performance evaluation of Attribute-Based Encryption on constrained IoT devices, file e0d6c930-732e-fcf8-e053-d805fe0aa794
|
13
|
Virtual private ledgers: Embedding private distributed ledgers over a public blockchain by cryptography, file e0d6c930-64ea-fcf8-e053-d805fe0aa794
|
12
|
Assessing the Cost of Quantum Security for Automotive Over-the-Air Updates, file e0d6c931-7b0d-fcf8-e053-d805fe0aa794
|
12
|
On Improving SimBlock Blockchain Simulator, file e0d6c931-9da4-fcf8-e053-d805fe0aa794
|
12
|
On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding, file e0d6c930-8916-fcf8-e053-d805fe0aa794
|
11
|
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-ac7e-fcf8-e053-d805fe0aa794
|
9
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-c01a-fcf8-e053-d805fe0aa794
|
9
|
Sensing the cities with social-aware unmanned aerial vehicles, file e0d6c92b-f132-fcf8-e053-d805fe0aa794
|
7
|
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-abad-fcf8-e053-d805fe0aa794
|
7
|
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-6684-fcf8-e053-d805fe0aa794
|
6
|
An implementation and evaluation of the security features of RPL, file e0d6c930-6adf-fcf8-e053-d805fe0aa794
|
6
|
A low-cost UAV-based secure location verification method, file e0d6c930-95d2-fcf8-e053-d805fe0aa794
|
6
|
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-9ef5-fcf8-e053-d805fe0aa794
|
6
|
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-bfd4-fcf8-e053-d805fe0aa794
|
6
|
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware, file e0d6c92f-818e-fcf8-e053-d805fe0aa794
|
4
|
Secure positioning with non-ideal distance bounding protocols, file e0d6c930-95dc-fcf8-e053-d805fe0aa794
|
4
|
null, file e0d6c926-1b53-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c926-39e7-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c926-4a5e-fcf8-e053-d805fe0aa794
|
3
|
On Designing Resilient Location-Privacy Obfuscators, file e0d6c927-4d26-fcf8-e053-d805fe0aa794
|
3
|
A uniformity-based approach to location privacy, file e0d6c930-7acf-fcf8-e053-d805fe0aa794
|
3
|
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks, file e0d6c930-9ef0-fcf8-e053-d805fe0aa794
|
3
|
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-be20-fcf8-e053-d805fe0aa794
|
3
|
Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update, file 02ef6f37-0a6a-4cd2-8fae-97fcde04dd6e
|
2
|
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c927-51d3-fcf8-e053-d805fe0aa794
|
2
|
Secure positioning with non-ideal distance bounding protocols, file e0d6c92f-dde6-fcf8-e053-d805fe0aa794
|
2
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c92f-fa48-fcf8-e053-d805fe0aa794
|
2
|
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9407-fcf8-e053-d805fe0aa794
|
2
|
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-b589-fcf8-e053-d805fe0aa794
|
2
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c930-bb63-fcf8-e053-d805fe0aa794
|
2
|
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-74f6-fcf8-e053-d805fe0aa794
|
1
|
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67b-fcf8-e053-d805fe0aa794
|
1
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c930-a684-fcf8-e053-d805fe0aa794
|
1
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-a97f-fcf8-e053-d805fe0aa794
|
1
|
A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things, file e0d6c932-1fa8-fcf8-e053-d805fe0aa794
|
1
|
A Rational Mining Strategy for Proof-of-Work Consensus Algorithms, file e78b43e0-6d51-4164-a80e-19f16dea1b98
|
1
|
Totale |
1.113 |