Practical security analysis for the constrained node networks: Focusing on the DTLS protocol

Jiyong Han, Minkeun Ha, Daeyoung Kim 0001. Practical security analysis for the constrained node networks: Focusing on the DTLS protocol. In 5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015. pages 22-29, IEEE, 2015. [doi]

@inproceedings{HanH015,
  title = {Practical security analysis for the constrained node networks: Focusing on the DTLS protocol},
  author = {Jiyong Han and Minkeun Ha and Daeyoung Kim 0001},
  year = {2015},
  doi = {10.1109/IOT.2015.7356544},
  url = {http://dx.doi.org/10.1109/IOT.2015.7356544},
  researchr = {https://researchr.org/publication/HanH015},
  cites = {0},
  citedby = {0},
  pages = {22-29},
  booktitle = {5th International Conference on the Internet of Things, IOT 2015, Seoul, South Korea, 26-28 October, 2015},
  publisher = {IEEE},
  isbn = {978-1-4673-8056-0},
}