Book / Book Chapters

  • C.Schmitt, S.Siffert, B.Stiller: sTiki: A Mutual Authentication Protocol for Very Constrained Sensor Devices in Smart Home Environments. Cybersecurity for Smart Home, R. Khatoun (Ed.), Chapter 7, ISTE-Wiley Publishers, New York, NY, USA, DOI: 10.1002/9781119987451.ch7, October 2022
  • C.Schmitt, M.Weber: Home Automation Solution for SecureWSN. Cybersecurity for Smart Home, R. Khatoun (Ed.), Chapter 1, ISTE-Wiley Publishers, New York, NY, USA, DOI: 10.1002/9781119987451.ch1, October 2022
  • N.Mäurer, T.Gräupl, C.Schmitt: Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS). Aviation Cybersecurity: Foundations, Principles, and Applications, H.Song, K.Hopkinson, T.De Cola, T.Alexandrovich, D.Liu (Eds.), Chapter 04, pp. 83-121, Stevenage, UK, DOI: 10.1049/SBRA545E_ch, December 2021 online, February 2022 printed
  • B.Stiller, E.Schiller, C.Schmitt: An Overview of Network Communication Technologies for IoT. Handbook of Internet- of-Things, S. Ziegler, S. and M. James (Eds.), Springer, Cham, Switzerland, Chapter 12, November 2020
  • C. Schmitt, D. Bünzli, B. Stiller: WebMaDa 2.1 - A Web-based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, Chapter 9, pp. 159-184, New York, NY, USA, DOI: 10.1002/9781119527978.ch9, December 2019
  • P. Porambage, A. Braeken, C.Schmitt: Public Key Based Protocols - EC Crypto. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, New York, NY, USA, Chapter 4, pp. 85-100, DOI: 10.1002/9781119527978.ch4, December 2019
  • C.Schmitt, T.Kothmayr, W.Hu, B.Stiller: Two-way Authentication for the Internet-of-Things. Internet of Things: Novel Advances and Envisioned Applications, D.P. Acharjya and M. Kalaiselvi Geetha (Eds.), Springer, New York, NY, USA, Chapter 2, pp. 27-56, DOI: 10.1007/978-3-319-53472-5_2 May, 2017
  • C.Schmitt, C.Anliker, B.Stiller: Efficient and Secure Pull Requests for Emergency Cases Using a Mobile Access Framework. Managing the Web of Things: Linking the Real World to the Web, M.Sheng, Y. Qin, L. Yao, and B. Benatallah (Eds.), Morgen Kaufmann (imprint of Elsevier), Burlington, MA, USA, Chapter 8, pp. 229-247, ISBN: 978-0-12-809764-9, DOI: 10.1016/B978-0-12-809764-9.00010-X, February 2017
  • C.Schmitt, M.Noack, B.Stiller: TinyTO: Two-Way Authentication for Constrained Devices in the Internet of Things. Internet of Things: Principles and Paradigms, R.Buyya, A.V. Dastjerdi (Eds.), Morgan Kaufmann, Imprint of Elsevier, Cambridge, MA, USA, Chapter 13, pp. 239-258, ISBN: 978-0128053959, DOI: 10.1016/B978-0-12-805395-9.00013-7, May 2016
  • A.Sperotto, R.Hofstede, A.Dainotti, C.Schmitt, G.Dreo-Rodosek (Eds.): Special Issue on Measure, Detect, and Mitigate-Challenges and Trends in Network Security. International Journal of Network Management 25 (5), John Wiley and Sons, Ltd, pp. 261-262, Hoboken, NJ, USA, DOI: 10.1002/nem.1905, September 2015
  • S.Latre, M.Charalambides, J.Francois, C.Schmitt, B.Stiller (Eds.): Intelligent Mechanisms for Network Configuration and Security. Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015, Lectue Notes in Computer Science, Volume 9122, ISBN: 978-3-319-20033-0 (Print) 978-3-319-20034-7 (Online), DOI: 10.1007/978-3-319-20034-7, June 2015
  • C.Schmitt: Secure Data Transmission in Wireless Sensor Networks. Dissertation, Series Network Architectures and Services (NET), Chair for Network Architectures and Services, Technische Universität München, ISBN: 3-937201-36-X, ISSN: 1868-2634 (print), ISSN: 1868-2642 (electronic), DOI: 10.2313/NET-2013-07-2, NET 2013-07-2, Series Editor: Georg Carle, Technische Universität München, Munich, Germany, July 2013
  • C.Schmitt, G.Carle: Applications for Wireless Sensor Networks. Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications, N.Antonopulus, G.Exarchakos, M.Li and A.Liotto (Eds.), Chapter 46, pp. 1076-1091, ISBN: 1-61520-686-8, Information Science Publishing, Hershey, PA, USA, DOI: 10.4018/978-1-61520-686-5.ch046, January 2010

Other Publications

Click on the category your are interesting in to receive the complete list: