Follow
Ethiopia Nigussie
Ethiopia Nigussie
Docent in Self-aware Networked Systems, Department of Future Technologies, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways
SR Moosavi, TN Gia, AM Rahmani, E Nigussie, S Virtanen, J Isoaho, ...
Procedia Computer Science 52, 452-459, 2015
3572015
End-to-end security scheme for mobility enabled healthcare Internet of Things
SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ...
Future Generation Computer Systems 64, 108-124, 2016
3312016
Distributed internal anomaly detection system for Internet-of-Things
NK Thanigaivelan, E Nigussie, RK Kanth, S Virtanen, J Isoaho
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
1362016
IoT-based irrigation management for smallholder farmers in rural Sub-Saharan Africa
E Nigussie, T Olwal, G Musumba, T Tegegne, A Lemma, F Mekuria
Procedia Computer Science 177, 86-93, 2020
632020
Performance analysis of end-to-end security schemes in healthcare IoT
SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho
Procedia computer science 130, 432-439, 2018
602018
Security of LoRaWAN v1. 1 in backward compatibility scenarios
TCM Dönmez, E Nigussie
Procedia computer science 134, 51-58, 2018
592018
An elliptic curve-based mutual authentication scheme for RFID implant systems
SR Moosavi, E Nigussie, S Virtanen, J Isoaho
Procedia Computer Science 32, 198-206, 2014
572014
Session resumption-based end-to-end security for healthcare internet-of-things
SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ...
2015 IEEE International Conference on Computer and Information Technology …, 2015
542015
Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip
L Guang, E Nigussie, P Rantala, J Isoaho, H Tenhunen
ACM Transactions on Embedded Computing Systems (TECS) 9 (3), 1-24, 2010
532010
Internet of things based durability monitoring and assessment of reinforced concrete structures
WZ Taffese, E Nigussie, J Isoaho
Procedia Computer Science 155, 672-679, 2019
432019
Cryptographic key generation using ECG signal
SR Moosavi, E Nigussie, S Virtanen, J Isoaho
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
402017
Low-latency approach for secure ECG feature based cryptographic key generation
SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho
IEEE Access 6, 428-442, 2017
372017
Autonomous DVFS on supply islands for energy-constrained NoC communication
L Guang, E Nigussie, L Koskinen, H Tenhunen
Architecture of Computing Systems–ARCS 2009: 22nd International Conference …, 2009
322009
Security of join procedure and its delegation in lorawan v1. 1
TCM Dönmez, E Nigussie
Procedia Computer Science 134, 204-211, 2018
302018
High‐Performance Long NoC Link Using Delay‐Insensitive Current‐Mode Signaling
E Nigussie, T Lehtonen, S Tuuna, J Plosila, J Isoaho
VLSI design 2007 (1), 046514, 2007
272007
CoDRA: Context-based dynamically reconfigurable access control system for android
NK Thanigaivelan, E Nigussie, A Hakkala, S Virtanen, J Isoaho
Journal of Network and Computer Applications 101, 1-17, 2018
262018
Interconnection alternatives for hierarchical monitoring communication in parallel socs
L Guang, E Nigussie, J Isoaho, P Rantala, H Tenhunen
Microprocessors and Microsystems 34 (5), 118-128, 2010
232010
Equalizing energy distribution in sensor nodes through optimization of RPL
J Nurmio, E Nigussie, C Poellabauer
2015 IEEE International Conference on Computer and Information Technology …, 2015
212015
Hybrid internal anomaly detection system for IoT: Reactive nodes with cross‐layer operation
NK Thanigaivelan, E Nigussie, S Virtanen, J Isoaho
Security and Communication Networks 2018 (1), 3672698, 2018
152018
Positioning antifragility for clouds on public infrastructures
L Guang, E Nigussie, J Plosila, H Tenhunen
Procedia Computer Science 32, 856-861, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20