Gary Steri

According to our database1, Gary Steri authored at least 31 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.
IEEE Trans. Engineering Management, 2020

A Review on the Application of Distributed Ledgers in the Evolution of Road Transport.
IEEE Internet Comput., 2020

Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies.
IEEE Secur. Priv., 2020

2019
Radiometric identification using variational mode decomposition.
Comput. Electr. Eng., 2019

Zone Keys Trust Management in Vehicular Networks based on Blockchain.
Proceedings of the 2019 Global IoT Summit, 2019

2018
Synchrosqueezing Transform Based Methodology for Radiometric Identification.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns.
Sensors, 2017

Mobile phone identification through the built-in magnetometers.
CoRR, 2017

A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components.
IEEE Commun. Surv. Tutorials, 2017

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017

Blockchain-based Identity Management and Data Usage Control (Extended Abstract).
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Imaging time series for internet of things radio frequency fingerprinting.
Proceedings of the International Carnahan Conference on Security Technology, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Improving Internet of Things device certification with policy-based management.
Proceedings of the Global Internet of Things Summit, 2017

Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy.
Proceedings of the Global Internet of Things Summit, 2017

A Blockchain-based Approach for Data Accountability and Provenance Tracking.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS).
Sensors, 2016

A privacy enforcing framework for Android applications.
Comput. Secur., 2016

A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Informed consent in Internet of Things: The case study of cooperative intelligent transport systems.
Proceedings of the 23rd International Conference on Telecommunications, 2016

LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis.
Proceedings of the European Conference on Networks and Communications, 2016

2015
SecKit: A Model-based Security Toolkit for the Internet of Things.
Comput. Secur., 2015

An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

2014
Building Trust in the Human?Internet of Things Relationship.
IEEE Technol. Soc. Mag., 2014

Enforcement of security policy rules for the Internet of Things.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Connectivity and security in a D2D communication protocol for public safety applications.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Privacy leakages in Smart Home wireless technologies.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2009
Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Two methods for body parameter analysis using Body Sensor Networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009


  Loading...