Publications

Book / Book Chapters



N.Mäurer, T.Gräupl, C.Schmitt: Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS). Aviation Cybersecurity: Foundations, Principles, and Applications, H.Song, K.Hopkinson, T.De Cola, T.Alexandrovich, D.Liu (Eds.), Chapter 07, pp. 83-121, February 2022

C.Schmitt, S.Siffert, B.Stiller: sTiki: A Mutual Authentication Protocol for Very Constrained Sensor Devices in Smart Home Environments. Cybersecurity for Smart Home, R. Khatoun (Ed.), ISTE-Wiley Publishers, New York, NY, USA, expected June 2021 (acceptance notification October 15, 2020)

C.Schmitt, M.Weber: Home Automation Solution for SecureWSN. Cybersecurity for Smart Home, R. Khatoun (Ed.), ISTE-Wiley Publishers, New York, NY, USA, expected June 2021 (acceptance notification October 15, 2020)

B.Stiller, E.Schiller, C.Schmitt: An Overview of Network Communication Technologies for IoT. Handbook of Internet- of-Things, S. Ziegler, S. and M. James (Eds.), Springer, Cham, Switzerland, Chapter 12 (acceptance notification October 15, 2020)

C. Schmitt, D. Bünzli, B. Stiller: WebMaDa 2.1 - A Web-based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, Chapter 9, pp. 159-184, December 2019

P. Porambage, A. Braeken, C.Schmitt: Public Key Based Protocols - EC Crypto. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, Chapter 4, pp. 85-100, December 2019

C.Schmitt, T.Kothmayr, W.Hu, B.Stiller: Two-way Authentication for the Internet-of-Things. Internet of Things: Novel Advances and Envisioned Applications, D.P. Acharjya and M. Kalaiselvi Geetha (Eds.), Springer, New York, NY, USA, Chapter 2, pp. 27-56, May 2017

C.Schmitt, C.Anliker, B.Stiller: Efficient and Secure Pull Requests for Emergency Cases Using a Mobile Access Framework. Managing the Web of Things: Linking the Real World to the Web, M.Sheng, Y. Qin, L. Yao, and B. Benatallah (Eds.), Morgen Kaufmann (imprint of Elsevier), Chapter 8, pp. 229-247, ISBN: 978-0-12-809764-9, February 2017

C.Schmitt, M.Noack, B.Stiller: TinyTO: Two-Way Authentication for Constrained Devices in the Internet of Things. Internet of Things: Principles and Paradigms, R.Buyya, A.V. Dastjerdi (Eds.), Morgan Kaufmann, Imprint of Elsevier, Cambridge, MA, USA, Chapter 13, pp. 239-258, ISBN: 978-0128053959, May 2016

A.Sperotto, R.Hofstede, A.Dainotti, C.Schmitt, G.Dreo-Rodosek (Eds.): Special Issue on Measure, Detect, and Mitigate-Challenges and Trends in Network Security. International Journal of Network Management 25 (5), John Wiley and Sons, Ltd , 261-262, September 2015

S.Latre, M.Charalambides, J.Francois, C.Schmitt, B.Stiller (Eds.): Intelligent Mechanisms for Network Configuration and Security. Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015, Lectue Notes in Computer Science, Volume 9122, ISBN: 978-3-319-20033-0 (Print) 978-3-319-20034-7 (Online), June 2015

C.Schmitt: Secure Data Transmission in Wireless Sensor Networks. Dissertation, Series Network Architectures and Services (NET), Chair for Network Architectures and Services, Technische Universität München, ISBN: 3-937201-36-X, ISSN: 1868-2634 (print), ISSN: 1868-2642 (electronic), DOI: 10.2313/NET-2013-07-2, NET 2013-07-2, Series Editor: Georg Carle, Technische Universität München, Munich, Germany, July 2013

C.Schmitt, G.Carle: Applications for Wireless Sensor Networks. Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications, Edited by N.Antonopulus, G.Exarchakos, M.Li and A.Liotto, Chapter 46, pp. 1076-1091, ISBN: 1-61520-686-8, Information Science Publishing, January 2010





Other Publications



Click on the category your are interesting in to receive the complete list: