Similar Items: MQTT Across a Raspberry Pi 5 IoT Network Utilizing Quantum-resistant Signature Algorithms
- Long-Term Risks of IoT Devices: The Case of the Smart Fridge
- SILMARILS: Information-Theoretic and Quantum-Secure Designated-Verifier Signatures
- Design and Performance Evaluation of a BLE-Based IoT Authentication System
- Empowering IoT Security: On-Device Intrusion Detection in Resource Constrained Devices
- Analyzing Unsolicited Internet Traffic: Measuring IoT Security Threats via Network Telescopes
- Self-Adaptive Multi-Agent LLM-Based Security Pattern Selection for IoT Systems