Name
Affiliation
Papers
SHAHID RAZA
SICS Swedish ICT, Isafjordsgatan 22, S-16440 Stockholm, Sweden
36
Collaborators
Citations 
PageRank 
66
493
36.66
Referers 
Referees 
References 
1152
430
260
Search Limit
1001000
Title
Citations
PageRank
Year
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection40.402021
PKI4IoT: Towards Public Key Infrastructure for the Internet of Things20.512020
Group Rekeying Based On Member Join History00.342020
FoNAC - An Automated Fog Node Audit and Certification Scheme20.392020
Application Layer Key Establishment for End-to-End Security in IoT00.342020
Indraj: digital certificate enrollment for battery-powered wireless devices10.372019
Towards Supporting IoT Device Storage and Network Security Using DTLS00.342019
TinyIKE: Lightweight IKEv2 for Internet of Things10.362019
FDTLS: Supporting DTLS-Based Combined Storage and Communication Security for IoT Devices10.372019
Group-IKEv2 for multicast IPsec in the internet of things.00.342019
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control00.342018
Towards Formal Verification of Contiki: Analysis of the AESCCM* Modules with Frama-C00.342018
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices.00.342018
Protecting Glossy-Based Wireless Networks from Packet Injection Attacks10.352017
Intrusion Detection in the RPL-connected 6LoWPAN Networks.20.362017
SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things.60.572017
Axiom: DTLS-Based Secure IoT Group Communication.40.412017
Building the Internet of Things with bluetooth smart.140.832017
Blockchain and IoT - Mind the Gap.00.342017
Lightweight X.509 Digital Certificates for the Internet of Things.00.342017
Fusion: Coalesced Confidential Storage and Communication Framework for the IoT60.582016
S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things.180.792016
Bluetooth smart: An enabling technology for the Internet of Things100.752015
BSD-based elliptic curve cryptography for the open Internet of Things40.502015
An experimental study of attacks on the availability of Glossy.30.392015
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN.452.522014
Delegation-based authentication and authorization for the IP-based Internet of Things321.682014
Combined secure storage and communication for the Internet of Things.80.722013
SVELTE: Real-time intrusion detection in the Internet of Things1194.472013
Routing Attacks And Countermeasures In The Rpl-Based Internet Of Things602.332013
Codo: confidential data storage for wireless sensor networks40.662012
6LoWPAN Compressed DTLS for CoAP453.212012
Securing communication in 6LoWPAN with compressed IPsec788.042011
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec20.372011
Security considerations for the WirelessHART protocol191.282009
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator20.392009