Osman Ugus

According to our database1, Osman Ugus authored at least 20 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
POSTER: Towards Secure 5G Infrastructures for Production Systems.
CoRR, 2024

2016
TRAIL: Topology Authentication in RPL.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

2013
Secure and Reliable Remote Programming in Wireless Sensor Networks.
PhD thesis, 2013

WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wirel. Pers. Commun., 2013

Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

Malleability resilient (premium) Concealed Data Aggregation.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

2012
Do not snoop my habits: preserving privacy in the smart grid.
IEEE Commun. Mag., 2012

Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture.
Proceedings of the SECRYPT 2012, 2012

A leaky bucket called smartphone.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A Smartphone Security Architecture for App Verification and Process Authentication.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Dependable Over-the-Air Programming.
Ad Hoc Sens. Wirel. Networks, 2011

An MTM based Watchdog for Malware Famishment in Smartphones.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011

2010
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen).
it Inf. Technol., 2010

An integrated system for secure code distribution in Wireless Sensor Networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
CoRR, 2009

A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Security enhanced multi-hop over the air reprogramming with Fountain Codes.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
A secure and resilient WSN roadside architecture for intelligent transport systems.
Proceedings of the First ACM Conference on Wireless Network Security, 2008


  Loading...