Table of Contents
- The Internet of Things and its Security Requirements
- IoT Security - Vulnerabilities, Attacks, and Countermeasures
- Security Engineering for IoT Development
- IoT Security Lifecycle
- IoT as Interconnection of Threats
- Crypto Foundations I
- Crypto Foundations II
- Privacy Preservation for the Internet of Things
- Location Privacy Enhancement in the Internet of Vehicles
- Privacy Protection in Key Personal IoT Applications
- Trust and Trust Models for the IoT
- Framework for Privacy and Trust in IoT
- Preventing Unauthorized Access to Sensor Data and Authentication in IoT
- Computational Security for the IoT and Beyond
- Identity and Access Management Solutions for the IoT
- Privacy-Preserving Time Series Data Aggregation for IoT
- Path Generation Scheme for Real-Time Green IoT
- Security Protocols for IoT Access Networks and Their Impact on Mobile Networks
- Cloud Security for the IoT
- Policy-Based Approaches for Informed Consent in IoT
- Blockchains for Internet of Things
- Game Theory Foundation
- Security Products