Jiyong Han, Minkeun Ha, Daeyoung Kim 0001. Practical security analysis for the constrained node networks: Focusing on the DTLS protocol. In 5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015. pages 22-29, IEEE, 2015. [doi]
@inproceedings{HanH015, title = {Practical security analysis for the constrained node networks: Focusing on the DTLS protocol}, author = {Jiyong Han and Minkeun Ha and Daeyoung Kim 0001}, year = {2015}, doi = {10.1109/IOT.2015.7356544}, url = {http://dx.doi.org/10.1109/IOT.2015.7356544}, researchr = {https://researchr.org/publication/HanH015}, cites = {0}, citedby = {0}, pages = {22-29}, booktitle = {5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015}, publisher = {IEEE}, isbn = {978-1-4673-8056-0}, }