Security analysis of the constrained application protocol in the Internet of Things

Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash. Security analysis of the constrained application protocol in the Internet of Things. In Second International Conference on Future Generation Communication Technologies (FGCT 2013), London, United Kingdom, November 12-14, 2013. pages 163-168, IEEE, 2013. [doi]

Authors

Thamer A. Alghamdi

This author has not been identified. Look up 'Thamer A. Alghamdi' in Google

Aboubaker Lasebae

This author has not been identified. Look up 'Aboubaker Lasebae' in Google

Mahdi Aiash

This author has not been identified. Look up 'Mahdi Aiash' in Google