Object Security for Constrained RESTful Environments (OSCORE) G Selander, J Mattsson, F Palombini, L Seitz https://tools.ietf.org/html/rfc8613, 2019 | 200* | 2019 |
Authorization framework for the internet-of-things L Seitz, G Selander, C Gehrmann 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013 | 165 | 2013 |
S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things S Raza, L Seitz, D Sitenkov, G Selander IEEE Transactions on Automation Science and Engineering 13 (3), 1270-1280, 2016 | 145 | 2016 |
RFC 9200: Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth) L Seitz, G Selander, E Wahlstroem, S Erdtman, H Tschofenig RFC Editor, 2022 | 120* | 2022 |
Method and network for securely delivering streaming data F Lindholm, R Blom, K Norrman, G Selander, M Näslund US Patent 7,917,946, 2011 | 119 | 2011 |
Ephemeral diffie-hellman over cose (edhoc) G Selander, J Mattsson, F Palombini Internet Engineering Task Force, Internet-Draft draft-ietf-lake-edhoc-09, 2021 | 110 | 2021 |
Method and network for securely delivering streaming data F Lindholm, R Blom, K Norrman, G Selander, M Näslund US Patent 8,196,194, 2012 | 83 | 2012 |
Privacy in machine-to-machine communications a state-of-the-art survey Y Cheng, M Naslund, G Selander, E Fogelström 2012 IEEE International Conference on Communication Systems (ICCS), 75-79, 2012 | 54 | 2012 |
New paradigms for access control in constrained environments A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar 2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014 | 51 | 2014 |
Use cases for authentication and authorization in constrained environments L Seitz, S Gerdes, G Selander, M Mani, S Kumar | 48 | 2016 |
Verifying neighbor cell J Rune, J Alonso-Rubio, G Selander US Patent 8,630,648, 2014 | 48 | 2014 |
Apparatus and methods for obtaining a password hint G Selander, M Näslund US Patent 9,524,395, 2016 | 39 | 2016 |
Setup and configuration of relay nodes A Rácz, G Selander, M Näslund, L Barriga, M Lindström, G Mildh, ... US Patent 8,797,940, 2014 | 31 | 2014 |
CRC-based message authentication for 5G mobile technology E Dubrova, M Näslund, G Selander 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1186-1191, 2015 | 28 | 2015 |
Radio access system attachment J Sachs, G Selander, A Méhes, T Rinta-Aho, J Lundsjö, J Arkko, ... US Patent App. 12/295,892, 2009 | 27 | 2009 |
Group oscore-secure group communication for coap M Tiloca, G Selander, F Palombini, J Park Internet-Draft-work in progress 13. IETF, 2021 | 20 | 2021 |
Message authentication based on cryptographically secure CRC without polynomial irreducibility test E Dubrova, M Näslund, G Selander, F Lindqvist Cryptography and communications 10, 383-399, 2018 | 20 | 2018 |
Network composition M Johnsson, A Mehés, G Selander, N Papadoglou, M Priestley, R Aguero, ... Wireless World Research Forum 15, 2005 | 20 | 2005 |
An architecture for authorization in constrained environments S Gerdes, L Seitz, G Selander, C Bormann IETF Draft, October 22, 2018 | 19 | 2018 |
Compression of IPsec AH and ESP headers for constrained environments S Raza, S Duquennoy, G Selander draft-raza-6lowpanipsec-00 (WiP), IETF, 2013 | 19 | 2013 |