default search action
Jorge Granjal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Hadi Gharavi, Jorge Granjal, Edmundo Monteiro:
Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions. IEEE Commun. Surv. Tutorials 26(3): 1748-1774 (2024) - [j16]Munkenyi Mukhandi, Eduardo Andrade, Jorge Granjal, João P. Vilela:
Enhanced authentication and device integrity protection for GDOI using blockchain. Trans. Emerg. Telecommun. Technol. 35(5) (2024) - [j15]Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado:
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. J. Netw. Syst. Manag. 32(1): 19 (2024) - 2023
- [j14]Manisha Malik, Kamaldeep, Maitreyee Dutta, Jorge Granjal:
L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things. IEEE Access 11: 35517-35540 (2023) - [c19]Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado:
A distributed network-aware TSCH scheduling. DRCN 2023: 1-8 - [c18]Ivanilson França Vieira Júnior, Marília Curado, Jorge Granjal:
Towards the support of Industrial IoT applications with TSCH. SAC 2023: 1792-1798 - 2022
- [j13]Floriano Neto, Jorge Granjal, Vasco Pereira:
A Survey on Security Approaches on PPDR Systems Toward 5G and Beyond. IEEE Access 10: 117118-117140 (2022) - [j12]Miguel Rosendo, Jorge Granjal:
Energy-Aware Security Adaptation for Low-Power IoT Applications. Network 2(1): 36-52 (2022) - [c17]Munkenyi Mukhandi, Francisco Damião, Jorge Granjal, João P. Vilela:
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices. CCNC 2022: 433-436 - [c16]Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado:
TSCH Network Health: Identifying the Breaking Point. Intelligent Environments (Workshops) 2022: 223-232 - 2021
- [j11]Eduardo Andrade, Jorge Granjal, João P. Vilela, Carlos Arantes:
A Security Gateway for power distribution systems in open networks. Comput. Secur. 111: 102492 (2021) - [j10]Kevin Carvalho, Jorge Granjal:
Security and Privacy for Mobile IoT Applications Using Blockchain. Sensors 21(17): 5931 (2021) - 2020
- [j9]Kamaldeep, Maitreyee Dutta, Jorge Granjal:
Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms. IEEE Access 8: 127272-127312 (2020) - [j8]Jesús Sánchez Gómez, Dan García-Carrillo, Ramon Sanchez-Iborra, José Luis Hernández Ramos, Jorge Granjal, Rafael Marín-Pérez, Miguel A. Zamora-Izquierdo:
Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions. IEEE Access 8: 216437-216460 (2020) - [c15]Munkenyi Mukhandi, Eduardo Andrade, Francisco Damião, Jorge Granjal, João P. Vilela:
Blockchain-based scalable authentication for IoT: poster abstract. SenSys 2020: 667-668
2010 – 2019
- 2019
- [j7]Manisha Malik, Maitreyee Dutta, Jorge Granjal:
A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things. IEEE Access 7: 27443-27464 (2019) - [c14]Nuno Lourenço, Bruno Cabral, Jorge Granjal:
Driving Profile using Evolutionary Computation. CEC 2019: 2466-2473 - 2018
- [j6]Jorge Granjal, Artur Pedroso:
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. Secur. Commun. Networks 2018: 1753897:1-1753897:14 (2018) - [j5]Jorge Granjal, João M. Silva, Nuno Lourenço:
Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection. Sensors 18(8): 2445 (2018) - [c13]Jorge Granjal, Artur Pedroso:
Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications. IoTBDS 2018: 164-172 - 2017
- [c12]Jorge Granjal, Edmundo Monteiro:
Adaptable End-To-End Security For Mobile IoT Sensing Applications. SafeThings@SenSys 2017: 20-25 - 2016
- [c11]Chengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. CNS 2016: 73-81 - [c10]Jorge Granjal, Edmundo Monteiro:
End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices. Networking 2016: 306-314 - 2015
- [j4]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks 24: 264-287 (2015) - [j3]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun. Surv. Tutorials 17(3): 1294-1312 (2015) - [j2]José Marinho, Jorge Granjal, Edmundo Monteiro:
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP J. Inf. Secur. 2015: 4 (2015) - 2014
- [j1]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Network-layer security for the Internet of Things using TinyOS and BLIP. Int. J. Commun. Syst. 27(10): 1938-1963 (2014) - [c9]Edmundo Monteiro, Marília Curado, Geert J. Heijenk, Torsten Braun, Jorge Granjal:
Message from the chairs. WMNC 2014: 1 - [p2]Iva Bojic, Jorge Granjal, Edmundo Monteiro, Damjan Katusic, Pavle Skocir, Mario Kusek, Gordan Jezic:
Communication and Security in Machine-to-Machine Systems. Wireless Networking for Moving Objects 2014: 255-281 - 2013
- [c8]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. Networking 2013: 1-9 - [c7]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications. WWIC 2013: 140-153 - [p1]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Security Issues and Approaches on Wireless M2M Systems. Wireless Networks and Security 2013: 133-164 - 2012
- [c6]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications. GreenCom 2012: 87-93 - [c5]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
On the feasibility of secure application-layer communications on the Web of Things. LCN 2012: 228-231 - 2011
- [c4]Vasco Pereira, Jorge Sá Silva, Jorge Granjal, Ricardo M. Silva, Edmundo Monteiro, Qiang Pan:
A Taxonomy of Wireless Sensor Networks with QoS. NTMS 2011: 1-4 - 2010
- [c3]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Enabling Network-Layer Security on IPv6 Wireless Sensor Networks. GLOBECOM 2010: 1-6 - [c2]Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
A secure interconnection model for IPv6 enabled wireless sensor networks. Wireless Days 2010: 1-6
2000 – 2009
- 2008
- [c1]Jorge Granjal, Ricardo M. Silva, Edmundo Monteiro, Jorge Sá Silva, Fernando Boavida:
Why is IPSec a viable option for wireless sensor networks. MASS 2008: 802-807
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint