![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/iotpts2016.bht:"
@inproceedings{DBLP:conf/ccs/AmanCS16, author = {Muhammad Naveed Aman and Kee Chaing Chua and Biplab Sikdar}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Position Paper: Physical Unclonable Functions for IoT Security}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {10--13}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899013}, doi = {10.1145/2899007.2899013}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AmanCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuchmannGGOP16, author = {Johannes Buchmann and Florian G{\"{o}}pfert and Tim G{\"{u}}neysu and Tobias Oder and Thomas P{\"{o}}ppelmann}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {High-Performance and Lightweight Lattice-Based Public-Key Encryption}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {2--9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899011}, doi = {10.1145/2899007.2899011}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BuchmannGGOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chow16, author = {Sherman S. M. Chow}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Functional Credentials for Internet of Things}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899014}, doi = {10.1145/2899007.2899014}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chow16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ContiNRS16, author = {Mauro Conti and Michele Nati and Enrico Rotundo and Riccardo Spolaor}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Mind The Plug! Laptop-User Recognition Through Power Consumption}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {37--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899009}, doi = {10.1145/2899007.2899009}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ContiNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaiderHR16, author = {Ihtesham Haider and Michael H{\"{o}}berl and Bernhard Rinner}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Trusted Sensors for Participatory Sensing and IoT Applications based on Physically Unclonable Functions}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {14--21}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899010}, doi = {10.1145/2899007.2899010}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaiderHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HardjonoS16, author = {Thomas Hardjono and Ned M. Smith}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {29--36}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899012}, doi = {10.1145/2899007.2899012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HardjonoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ObermaierH16, author = {Johannes Obermaier and Martin Hutle}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {22--28}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007.2899008}, doi = {10.1145/2899007.2899008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ObermaierH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016iotpts, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899007}, doi = {10.1145/2899007}, isbn = {978-1-4503-4283-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016iotpts.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.