Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
Image document

Secure and Authenticated Access to LLN Resources Through Policy Constraints

Konstantinos Rantos , Konstantinos Fysarakis , Othonas Soultatos , Ioannis Askoxylakis
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers hal-01442549v1
Image document

WSACd - A Usable Access Control Framework for Smart Home Devices

Konstantinos Fysarakis , Charalampos Konstantourakis , Konstantinos Rantos , Charalampos Manifavas , Ioannis Papaefstathiou
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.120-133, ⟨10.1007/978-3-319-24018-3_8⟩
Conference papers hal-01442557v1
Image document

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Konstantinos Rantos
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.155-162, ⟨10.1007/978-3-642-24712-5_13⟩
Conference papers hal-01596183v1
Image document

Policy-Based Access Control for Body Sensor Networks

Charalampos Manifavas , Konstantinos Fysarakis , Konstantinos Rantos , Konstantinos Kagiambakis , Ioannis Papaefstathiou
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.150-159, ⟨10.1007/978-3-662-43826-8_11⟩
Conference papers hal-01400937v1