Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments.
Authors: Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca
Journal: Internet of Things; Engineering Cyber Physical Human Systems
Available: https://doi.org/10.1016/j.iot.2020.100333
Exploiting If This Then That and Usage Control obligations for Smart Home security and management
Authors: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, AthanasiosRizos, Andrea Saracino
Journal: Concurrency and Computation Practice and Experience
Available: Exploiting If This Then That and Usage Control obligations for Smart Home security and management