Shahid Raza

According to our database1, Shahid Raza authored at least 26 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
CoRR, 2018

Towards Formal Verification of Contiki: Analysis of the AES-CCM* Modules with Frama-C.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Axiom: DTLS-Based Secure IoT Group Communication.
ACM Trans. Embedded Comput. Syst., 2017

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things.
Future Generation Comp. Syst., 2017

Building the Internet of Things with bluetooth smart.
Ad Hoc Networks, 2017

Protecting Glossy-Based Wireless Networks from Packet Injection Attacks.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Intrusion Detection in the RPL-connected 6LoWPAN Networks.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things.
IEEE Trans. Automation Science and Engineering, 2016

Fusion: coalesced confidential storage and communication framework for the IoT.
Security and Communication Networks, 2016

2015
An experimental study of attacks on the availability of Glossy.
Computers & Electrical Engineering, 2015

Bluetooth smart: An enabling technology for the Internet of Things.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

BSD-based elliptic curve cryptography for the open Internet of Things.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

2014
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN.
Security and Communication Networks, 2014

Delegation-based authentication and authorization for the IP-based Internet of Things.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

2013
Routing Attacks and Countermeasures in the RPL-Based Internet of Things.
IJDSN, 2013

SVELTE: Real-time intrusion detection in the Internet of Things.
Ad Hoc Networks, 2013

Combined secure storage and communication for the Internet of Things.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

2012
Codo: confidential data storage for wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

6LoWPAN Compressed DTLS for CoAP.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2009
Design and Implementation of a Security Manager for WirelessHART Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Security Considerations for the WirelessHART Protocol.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009


  Loading...