Abstract is missing.
- Towards Secure and Reliable IoT ApplicationsGang Tan. 1 [doi]
- EAPA: Efficient Attestation Resilient to Physical Attacks for IoT DevicesWenwen Yan, Anmin Fu, Yi Mu 0001, Xia Zhe, Shui Yu, Boyu Kuang. 2-7 [doi]
- Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing AttacksMonowar Hasan, Sibin Mohan. 8-14 [doi]
- FirmFuzz: Automated IoT Firmware Introspection and AnalysisPrashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard E. Shrobe, Mathias Payer. 15-21 [doi]
- Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned BlockchainsNikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, George C. Polyzos. 22-23 [doi]
- Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute ProfileGuillaume Celosia, Mathieu Cunche. 24-31 [doi]
- PoTN: A Novel Blockchain Consensus Protocol with Proof-of-Trust Negotiation in Distributed IoT NetworksJingyu Feng, Xinyu Zhao, Guangyue Lu, Feng Zhao. 32-37 [doi]
- An Efficient Image Encryption Scheme for Industrial Internet-of-Things DevicesMingwu Zhang, Bo Peng, Yu Chen. 38-43 [doi]
- New Features of Authentication Scheme for the IoT: A SurveyTing Yang, Guanghua Zhang, Ling Liu, Yiyu Yang, Shangru Zhao, Hongyu Sun, Wenjie Wang. 44-49 [doi]
- PLAR: Towards a Pluggable Software Architecture for Securing IoT DevicesUzma Maroof, Arash Shaghaghi, Sanjay Jha. 50-57 [doi]
- A Security Scheme for Fog Computing Environment of IoTYongkai Fan, Guanqun Zhao, Xiaofeng Sun, Jinghan Wang, Xia Lei, Fanglue Xia, Cong Peng. 58-59 [doi]