default search action
Malisa Vucinic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Rikard Höglund, Marco Tiloca, Göran Selander, John Preuß Mattsson, Malisa Vucinic, Thomas Watteyne:
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols. IEEE Access 12: 49865-49877 (2024) - [j16]Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Malisa Vucinic:
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. Computer 57(9): 101-110 (2024) - [c19]Alexandre Abadie, Malisa Vucinic, Diego Badillo, Said Alvarado-Marin, Filip Maksimovic, Thomas Watteyne:
Qrkey: Simply and Securely Controlling Swarm Robots. INFOCOM (Workshops) 2024: 1-6 - [c18]Elsa López Pérez, Thomas Watteyne, Malisa Vucinic:
Pre-Shared Key Authentication in Ephemeral Diffie-Hellman Over COSE. IOTSMS 2024: 254-257 - [c17]Sara Faour, Malisa Vucinic, Filip Maksimovic, David C. Burnett, Paul Muhlethaler, Thomas Watteyne, Kristofer S. F. Pister:
TMVS: Threshold-based Majority Voting Scheme for Robust SRAM PUFs. ISCC 2024: 1-8 - [c16]Geovane Fedrecheski, Malisa Vucinic, Thomas Watteyne:
Performance Comparison of EDHOC and DTLS 1.3 in Internet-of-Things Environments. WCNC 2024: 1-6 - [i10]Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Malisa Vucinic:
EDHOC is a New Security Handshake Standard: An Overview of Security Analysis. CoRR abs/2407.07444 (2024) - [i9]Göran Selander, John Preuß Mattsson, Marek Serafin, Marco Tiloca, Malisa Vucinic:
Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC). RFC 9529: 1-62 (2024) - 2023
- [c15]Sara Faour, Malisa Vucinic, Filip Maksimovic, David C. Burnett, Paul Muhlethaler, Thomas Watteyne, Kristofer S. J. Pister:
Implications of Physical Fault Injections on Single Chip Motes. WF-IoT 2023: 1-6 - 2022
- [j15]Jelena Crnogorac, Jovan Crnogorac, Malisa Vucinic, Enis Kocan, Thomas Watteyne:
Dense Multi-Channel Sniffing in Large IoT Networks. IEEE Access 10: 105101-105110 (2022) - [j14]Malisa Vucinic, Göran Selander, John Preuss Mattsson, Thomas Watteyne:
Lightweight Authenticated Key Exchange With EDHOC. Computer 55(4): 94-100 (2022) - [j13]Yasuyuki Tanaka, Pascale Minet, Malisa Vucinic, Xavier Vilajosana, Thomas Watteyne:
YSF: A 6TiSCH Scheduling Function Minimizing Latency of Data Gathering in IIoT. IEEE Internet Things J. 9(11): 8607-8615 (2022) - [j12]Mina Rady, Jonathan Muñoz, Razanne Abu-Aisheh, Malisa Vucinic, José Astorga Tobar, Alfonso Cortes, Quentin Lampin, Dominique Barthel, Thomas Watteyne:
A Historical Twist on Long-Range Wireless: Building a 103 km Multi-Hop Network Replicating Claude Chappe's Telegraph. Sensors 22(19): 7586 (2022) - 2021
- [j11]Timothy Claeys, Malisa Vucinic, Thomas Watteyne, Franck Rousseau, Bernard Tourancheau:
Performance of the Transport Layer Security Handshake Over 6TiSCH. Sensors 21(6): 2192 (2021) - [i8]Jelena Kovac, Jovan Crnogorac, Enis Kocan, Malisa Vucinic:
Sniffing Multi-hop Multi-channel Wireless Sensor Networks. CoRR abs/2101.07541 (2021) - [i7]Malisa Vucinic, Jonathan Simon, Kris Pister, Michael Richardson:
Constrained Join Protocol (CoJP) for 6TiSCH. RFC 9031: 1-41 (2021) - [i6]Tengfei Chang, Malisa Vucinic, Xavier Vilajosana, Simon Duquennoy, Diego Dujovne:
6TiSCH Minimal Scheduling Function (MSF). RFC 9033: 1-20 (2021) - 2020
- [j10]Malisa Vucinic, Tengfei Chang, Bozidar Skrbic, Enis Kocan, Milica Pejanovic-Djurisic, Thomas Watteyne:
Key Performance Indicators of the Reference 6TiSCH Implementation in Internet-of-Things Scenarios. IEEE Access 8: 79147-79157 (2020) - [j9]Xavier Vilajosana, Thomas Watteyne, Tengfei Chang, Malisa Vucinic, Simon Duquennoy, Pascal Thubert:
IETF 6TiSCH: A Tutorial. IEEE Commun. Surv. Tutorials 22(1): 595-615 (2020) - [j8]Tengfei Chang, Malisa Vucinic, Xavier Vilajosana-Guillen, Diego Dujovne, Thomas Watteyne:
6TiSCH minimal scheduling function: Performance evaluation. Internet Technol. Lett. 3(4) (2020) - [c14]Timothy Claeys, François-Xavier Molina, Malisa Vucinic, Thomas Watteyne, Emmanuel Baccelli:
RIOT and OpenWSN 6TiSCH: Happy Together. PEMWN 2020: 1-6 - [c13]Tengfei Chang, Timothy Claeys, Malisa Vucinic, Xavier Vilajosana, Titan Yuan, Brad Wheeler, Filip Maksimovic, David C. Burnett, Brian Kilberg, Kris Pister, Thomas Watteyne:
Industrial IoT with Crystal-Free Mote-on-Chip. VLSI Circuits 2020: 1-2
2010 – 2019
- 2019
- [j7]Esteban Municio, Glenn Daneels, Malisa Vucinic, Steven Latré, Jeroen Famaey, Yasuyuki Tanaka, Keoma Brun-Laguna, Kazushi Muraoka, Xavier Vilajosana, Thomas Watteyne:
Simulating 6TiSCH networks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j6]Xavier Vilajosana, Thomas Watteyne, Malisa Vucinic, Tengfei Chang, Kristofer S. J. Pister:
6TiSCH: Industrial Performance for IPv6 Internet-of-Things Networks. Proc. IEEE 107(6): 1153-1165 (2019) - [c12]Malisa Vucinic, Bozidar Skrbic, Enis Kocan, Milica Pejanovic-Djurisic, Thomas Watteyne:
OpenBenchmark: Repeatable and Reproducible Internet of Things Experimentation on Testbeds. INFOCOM Workshops 2019: 289-294 - 2018
- [j5]Malisa Vucinic, Thomas Watteyne, Xavier Vilajosana:
Broadcasting strategies in 6TiSCH networks. Internet Technol. Lett. 1(1) (2018) - [c11]Maria Rita Palattella, Federico Sismondi, Tengfei Chang, Loïc Baron, Malisa Vucinic, Pablo Modernell, Xavier Vilajosana, Thomas Watteyne:
F-Interop Platform and Tools: Validating IoT Implementations Faster. ADHOC-NOW 2018: 332-343 - [c10]Malisa Vucinic, Milica Pejanovic-Djurisic, Thomas Watteyne:
SODA: 6TiSCH Open Data Action. Bench@CPSWeek 2018: 42-46 - 2017
- [j4]Savio Sciancalepore, Malisa Vucinic, Giuseppe Piro, Gennaro Boggia, Thomas Watteyne:
Link-layer security in TSCH networks: effect on slot duration. Trans. Emerg. Telecommun. Technol. 28(1) (2017) - [j3]Malisa Vucinic, Michal Król, Baptiste Jonglez, Titouan Coladon, Bernard Tourancheau:
Trickle-D: High Fairness and Low Transmission Load With Dynamic Redundancy. IEEE Internet Things J. 4(5): 1477-1488 (2017) - 2016
- [c9]Sven Akkermans, Rafael Bachiller, Nelson Matthys, Wouter Joosen, Danny Hughes, Malisa Vucinic:
Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast. ICC 2016: 1-6 - 2015
- [b1]Malisa Vucinic:
Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things. (Architectures et protocoles pour une intégration sécurisée et économe en énergie des réseaux de capteurs dans l'Internet des objets). Grenoble Alpes University, France, 2015 - [j2]Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti:
OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks 32: 3-16 (2015) - [j1]Liviu-Octavian Varga, Gabriele Romaniello, Malisa Vucinic, Michel Favre, Andrei Banciu, Roberto Guizzetti, Christophe Planat, Pascal Urard, Martin Heusse, Franck Rousseau, Olivier Alphand, Etienne Dublé, Andrzej Duda:
GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network. IEEE Internet Things J. 2(5): 412-426 (2015) - [c8]Titouan Coladon, Malisa Vucinic, Bernard Tourancheau:
Improving trickle fairness: Locally-calculated redundancy constants. CFIP/NOTERE 2015: 1-6 - [c7]Malisa Vucinic, Bernard Tourancheau, Thomas Watteyne, Franck Rousseau, Andrzej Duda, Roberto Guizzetti, Laurent Damon:
DTLS performance in duty-cycled networks. PIMRC 2015: 1333-1338 - [c6]Titouan Coladon, Malisa Vucinic, Bernard Tourancheau:
Multiple redundancy constants with trickle. PIMRC 2015: 1951-1956 - [i5]Malisa Vucinic, Bernard Tourancheau, Thomas Watteyne, Franck Rousseau, Andrzej Duda, Roberto Guizzetti, Laurent Damon:
DTLS Performance in Duty-Cycled Networks. CoRR abs/1507.05810 (2015) - [i4]Titouan Coladon, Malisa Vucinic, Bernard Tourancheau:
Multiple Redundancy Constants with Trickle. CoRR abs/1507.05812 (2015) - 2014
- [c5]Malisa Vucinic, Gabriele Romaniello, Laurene Guelorget, Bernard Tourancheau, Franck Rousseau, Olivier Alphand, Andrzej Duda, Laurent Damon:
Topology construction in RPL networks over beacon-enabled 802.15.4. ISCC 2014: 1-7 - [c4]Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti:
Energy cost of security in an energy-harvested IEEE 802.15.4 Wireless Sensor Network. MECO 2014: 198-201 - [c3]Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti:
OSCAR: Object security architecture for the Internet of Things. WoWMoM 2014: 1-10 - [i3]Malisa Vucinic, Bernard Tourancheau, Andrzej Duda:
Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario. CoRR abs/1401.0997 (2014) - [i2]Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti:
OSCAR: Object Security Architecture for the Internet of Things. CoRR abs/1404.7799 (2014) - [i1]Malisa Vucinic, Gabriele Romaniello, Laurene Guelorget, Bernard Tourancheau, Franck Rousseau, Olivier Alphand, Andrzej Duda, Laurent Damon:
Topology Construction in RPL Networks over Beacon-Enabled 802.15.4. CoRR abs/1404.7803 (2014) - 2013
- [c2]Malisa Vucinic, Bernard Tourancheau, Andrzej Duda:
Performance comparison of the RPL and LOADng routing protocols in a Home Automation scenario. WCNC 2013: 1974-1979 - 2012
- [c1]Malisa Vucinic, Bernard Tourancheau, Andrzej Duda:
Simulation of a backward compatible IEEE 802.11g network: Access delay and throughput performance degradation. MECO 2012: 190-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint