Björn Stelte

According to our database1, Björn Stelte authored at least 18 papers between 2010 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Vertrauenswürdigkeit von Sensordaten in sicherheitskritischen drahtlosen Sensornetzen.
PhD thesis, 2013

A flexible cryptographic infrastructure for high-security SDR-based systems.
Proceedings of the 2013 Military Communications and Information Systems Conference, 2013

Assuring trustworthiness of sensor data for cyber-physical systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Thwarting attacks on ZigBee - Removal of the KillerBee stinger.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Towards a trust computing architecture for RPL in Cyber Physical Systems.
Proceedings of the 9th International Conference on Network and Service Management, 2013

ISP traceback - Attack path detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Attack trends in present computer networks.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

Evidence theory for reputation-based trust in wireless sensor networks.
Proceedings of the 3rd International Conference on Computing for Geospatial Research and Application, 2012

2011
Concealed Integrity Monitoring for Wireless Sensor Networks.
Wirel. Sens. Netw., 2011

Protection against Byzantine Attacks on Wireless Sensor Networks.
Proceedings of the WINSYS 2011, 2011

Byzantine Decisions for Inferring Trust in Sensor Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

An event management communication system for Wireless Sensor Networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Drahtlose Sensornetze in der Lehre-Sicherheitsbetrachtung von ZigBee-Netzen.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

Requirements for a future EWS - Cyber Defence in the internet of the future.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011

2010
A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes.
Wirel. Sens. Netw., 2010

State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOS.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Toward development of high secure sensor network nodes using an FPGA-based architecture.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010


  Loading...