The internet of things: a survey, Information Systems Frontiers, vol.17, pp.243-259, 2015. ,
Securing the internet of things: A standardization perspective, IEEE Internet of things Journal, vol.1, pp.265-275, 2014. ,
Internet of things for enterprise systems of modern manufacturing, IEEE Transactions on industrial informatics, vol.10, pp.1537-1546, 2014. ,
Key management systems for sensor networks in the context of the internet of things, Computers & Electrical Engineering, vol.37, pp.147-159, 2011. ,
An optimal class of symmetric key generation systems, Workshop on the Theory and Application of of Cryptographic Techniques, pp.335-338 ,
A pairwise key predistribution scheme for wireless sensor networks, ACM Transactions on Information and System Security (TISSEC), vol.8, pp.228-258, 2005. ,
A key management scheme using deployment knowledge for wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol.19, pp.1411-1425, 2008. ,
An efficient pairwise and group key management protocol for wireless sensor network, Wireless Personal Communications, vol.84, pp.2035-2053, 2015. ,
A matrix-based cross-layer key establishment protocol for smart homes, Information Sciences, vol.429, pp.390-405, 2018. ,
Matrix-based pairwise key establishment for wireless mesh networks, Future Generation Computer Systems, vol.30, pp.140-145, 2014. ,
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, IEEE, pp.1422-1430 ,
Eahkm+: energy-aware secure clustering scheme in wireless sensor networks, International Journal of High Performance Computing and Networking, vol.11, pp.145-155, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01483014
Skwn: Smart and dynamic key management scheme for wireless sensor networks, International Journal of Communication Systems, vol.32, p.3930, 2019. ,
On the energy cost of communication and cryptography in wireless sensor networks, Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing, pp.580-585 ,
A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security, 2015. ,
Trusted platform module basics: using TPM in embedded systems, 2006. ,
The avispa tool for the automated validation of internet security protocols and applications, pp.281-285 ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
An on-the-fly model-checker for security protocol analysis, European Symposium on Research in Computer Security, pp.253-270 ,
The cl-atse protocol analyser, International Conference on Rewriting Techniques and Applications, pp.277-286 ,
URL : https://hal.archives-ouvertes.fr/inria-00103573
Satmc: a sat-based model checker for security protocols, European workshop on logics in artificial intelligence, pp.730-733 ,
A high level protocol specification language for industrial security-sensitive protocols, Workshop on Specification and Automated Processing of Security Requirements-SAPS, p.13, 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00099882
Random key predistribution schemes for sensor networks, Proceedings. 2003 Symposium on, pp.197-213, 2003. ,
Energy analysis of public-key cryptography for wireless sensor networks, Pervasive Computing and Communications, pp.324-328, 2005. ,