Filter your results
- 4
- 4
- 4
- 1
- 1
- 2
- 4
- 1
- 4
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩
Conference papers
hal-01485932v1
|
||
|
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.601-615, ⟨10.1007/978-3-319-18467-8_40⟩
Conference papers
hal-01345151v1
|
||
|
Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.66-77, ⟨10.1007/978-3-030-30523-9_2⟩
Conference papers
hal-02458546v1
|
||
|
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.28-41, ⟨10.1007/978-3-642-39218-4_3⟩
Conference papers
hal-01463844v1
|