Practical security analysis for the constrained node networks: Focusing on the DTLS protocol

Jiyong Han, Minkeun Ha, Daeyoung Kim 0001. Practical security analysis for the constrained node networks: Focusing on the DTLS protocol. In 5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015. pages 22-29, IEEE, 2015. [doi]

Authors

Jiyong Han

This author has not been identified. Look up 'Jiyong Han' in Google

Minkeun Ha

This author has not been identified. Look up 'Minkeun Ha' in Google

Daeyoung Kim 0001

This author has not been identified. Look up 'Daeyoung Kim 0001' in Google