Göran Selander

According to our database1, Göran Selander authored at least 24 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols.
IEEE Access, 2024

2023
Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS).
RFC, July, 2023

2022
The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework.
RFC, August, 2022

Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE).
RFC, August, 2022

Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth).
RFC, August, 2022

Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing.
RFC, February, 2022

Lightweight Authenticated Key Exchange With EDHOC.
Computer, 2022

2020
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs).
RFC, March, 2020

2019
Object Security for Constrained RESTful Environments (OSCORE).
RFC, July, 2019

2018
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test.
Cryptogr. Commun., 2018

Lightweight Message Authentication for Constrained Devices.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2016
Use Cases for Authentication and Authorization in Constrained Environments.
RFC, January, 2016

S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things.
IEEE Trans Autom. Sci. Eng., 2016

Error-Correcting Message Authentication for 5G.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
Lightweight CRC-based Message Authentication.
IACR Cryptol. ePrint Arch., 2015

Cryptographically Secure CRC for Lightweight Message Authentication.
IACR Cryptol. ePrint Arch., 2015

CRC-Based Message Authentication for 5G Mobile Technology.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A random access procedure based on tunable puzzles.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
New paradigms for access control in constrained environments.
Proceedings of the 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, 2014

Energy-efficient message authentication for IEEE 802.15.4-based wireless sensor networks.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014

Secure and efficient LBIST for feedback shift register-based cryptographic systems.
Proceedings of the 19th IEEE European Test Symposium, 2014

2013
Authorization framework for the Internet-of-Things.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

2012
Privacy in machine-to-machine communications A state-of-the-art survey.
Proceedings of the IEEE International Conference on Communication Systems, 2012

2008
Decentralized Access Control Management for Network Configuration.
J. Netw. Syst. Manag., 2008


  Loading...