Security analysis of the constrained application protocol in the Internet of Things

Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash. Security analysis of the constrained application protocol in the Internet of Things. In Second International Conference on Future Generation Communication Technologies (FGCT 2013), London, United Kingdom, November 12-14, 2013. pages 163-168, IEEE, 2013. [doi]

Abstract

Abstract is missing.