Gå till sökfältet
Gå till sidans huvudinnehåll
Gå till tillgänglighetsredogörelsen
Forskning.fi
Menu
Suomeksi
På svenska
In English
Ingångssida
Sökning
Vetenskaps- och innovationspolitik
Vetenskaps- och forskningsnyheter
På svenska
- 2422 results
Publikationer
2422
Utlysningar
0
Beviljade finansiering
7
Personer
0
Data
2
Infrastrukturer
0
Organisationer
0
Projekt
0
Publikationer -
2 422
sökresultat
Gå till sökresultaten
Visa som bild
Begränsa sökning
Resultaten visas 1 - 10 / 2422
10
50
100
resultat / per sida
Vilka
publikations
uppgifter finns i tjänsten?
Icon
Publikationens namn
Upphovspersoner
Publikationskanal
År
Publicationer information ikon
Efficient key establishment for
constrained
iot
devices
with collaborative hip-based approach
Referentgranskad
DOI
10.1109/GLOCOM.2015.7417094
Porambage, Pawani; Braeken, An; Kumar, Pardeep; Gurtov, Andrei; Ylianttila, Mika
IEEE Global Communications Conference
2015
Publicationer information ikon
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for
Constrained
Devices
in Internet of Things
Referentgranskad
Öppen tillgång
DOI
10.1007/s11277-017-4176-5
Porambage, Pawani; Braeken, An; Kumar, Pardeep; Gurtov, Andrei; Ylianttila, Mika
Wireless personal communications
2017
Publicationer information ikon
Delayed key exchange for
constrained
smart
devices
Referentgranskad
DOI
10.1007/978-3-662-46338-3_2
Kannisto, Joona;Heikkinen, Seppo;Slavov, Kristian;Harju, Jarmo
Lecture Notes in Computer Science
2015
Publicationer information ikon
Resource
constrained
IOT environments A survey
Referentgranskad
Madhu, G. C.; Vijayakumar, P.; Gao, Xiao Zhi
Journal of Advanced Research in Dynamical and Control Systems
2017
Publicationer information ikon
Secure end-to-end communication for
constrained
devices
in IoT-enabled Ambient Assisted Living systems
Referentgranskad
DOI
10.1109/WF-IoT.2015.7389141
Porambage, Pawani; Braeken, An; Gurtov, Andrei; Ylianttila, Mika; Spinsante, Susanna
IEEE World Forum on Internet of Things
2015
Publicationer information ikon
ADHT: Agent-based DHT Architecture for
Constrained
Devices
Referentgranskad
DOI
10.1109/GLOCOM.2014.7037226
Harjula, Erkki; Leppänen, Teemu; Ojala, Timo; Ylianttila, Mika
IEEE global telecommunications conference
2014
Publicationer information ikon
High-Performance ELM for Memory
Constrained
Edge Computing
Devices
with Metal Performance Shaders
Referentgranskad
DOI
10.1007/978-3-030-58989-9_9
Akusok, Anton; Leal, Leonardo Espinosa; Björk, Kaj-Mikael; Lendasse, Amaury
Proceedings in adaptation, learning and optimization
2020
Publicationer information ikon
Camouflage learning Feature value obscuringambient intelligence for
constrained
devices
Referentgranskad
Öppen tillgång
DOI
10.1109/TMC.2021.3092271
Nguyen, Le Ngu; Sigg, Stephan; Lietzén, Jari; Findling, Rainhard Dieter; Ruttik, Kalle
IEEE Transactions on Mobile Computing
2021
Publicationer information ikon
Secure and Low-Power Authentication for Resource-
Constrained
Devices
Referentgranskad
Sethi, Mohit; Kortoci, Pranvera; Di Francesco, Mario; Aura, Tuomas
IEEE
2015
Publicationer information ikon
Feasibility characterization of cryptographic primitives for
constrained
(wearable) IoT
devices
Referentgranskad
Öppen tillgång
DOI
10.1109/PERCOMW.2016.7457161
Ometov, Aleksandr;Masek, Pavel;Malina, Lukas;Florea, Roman;Hosek, Jiri;Andreev, Sergey;Hajny, Jan;Ni...
IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS
2016
Efficient key establishment for
constrained
iot
devices
with collaborative hip-based approach
Referentgranskad
DOI
10.1109/GLOCOM.2015.7417094
2015
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for
Constrained
Devices
in Internet of Things
Referentgranskad
Öppen tillgång
DOI
10.1007/s11277-017-4176-5
2017
Delayed key exchange for
constrained
smart
devices
Referentgranskad
DOI
10.1007/978-3-662-46338-3_2
2015
Resource
constrained
IOT environments A survey
Referentgranskad
2017
Secure end-to-end communication for
constrained
devices
in IoT-enabled Ambient Assisted Living systems
Referentgranskad
DOI
10.1109/WF-IoT.2015.7389141
2015
ADHT: Agent-based DHT Architecture for
Constrained
Devices
Referentgranskad
DOI
10.1109/GLOCOM.2014.7037226
2014
High-Performance ELM for Memory
Constrained
Edge Computing
Devices
with Metal Performance Shaders
Referentgranskad
DOI
10.1007/978-3-030-58989-9_9
2020
Camouflage learning Feature value obscuringambient intelligence for
constrained
devices
Referentgranskad
Öppen tillgång
DOI
10.1109/TMC.2021.3092271
2021
Secure and Low-Power Authentication for Resource-
Constrained
Devices
Referentgranskad
2015
Feasibility characterization of cryptographic primitives for
constrained
(wearable) IoT
devices
Referentgranskad
Öppen tillgång
DOI
10.1109/PERCOMW.2016.7457161
2016
Föregående
1
2
3
4
5
Nästa
Resultaten visas 1 - 10 / 2422
Sida 1
Sort