Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices | IEEE Conference Publication | IEEE Xplore