Practical security analysis for the constrained node networks: Focusing on the DTLS protocol

Jiyong Han, Minkeun Ha, Daeyoung Kim 0001. Practical security analysis for the constrained node networks: Focusing on the DTLS protocol. In 5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015. pages 22-29, IEEE, 2015. [doi]

Abstract

Abstract is missing.