Scientific Articles

Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments.

Authors: Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca

Journal: Internet of Things; Engineering Cyber Physical Human Systems

Available: https://doi.org/10.1016/j.iot.2020.100333

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Authors: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, AthanasiosRizos, Andrea Saracino

Journal: Concurrency and Computation Practice and Experience

Available: Exploiting If This Then That and Usage Control obligations for Smart Home security and management