메뉴 건너뛰기




Volumn , Issue , 2013, Pages 163-168

Security analysis of the constrained application protocol in the Internet of Things

Author keywords

CoAP; DTLS; IPSec; S CoAP

Indexed keywords

COMMUNICATION SYSTEMS; HTTP; INTERNET;

EID: 84899008089     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FGCT.2013.6767217     Document Type: Conference Paper
Times cited : (58)

References (16)
  • 2
    • 78650919351 scopus 로고    scopus 로고
    • Embedded web services
    • Z. Shelby, "Embedded web services," IEEE Wireless Communications, vol. 17, no. 6, pp. 52-57, 2010
    • (2010) IEEE Wireless Communications , vol.17 , Issue.6 , pp. 52-57
    • Shelby, Z.1
  • 8
    • 84898951788 scopus 로고    scopus 로고
    • Working Group. Available at
    • Constrained RESTful Environments (CoRE) Working Group. Available at: https://datatracker.ietf.org/wg/core/charter/
    • Constrained RESTful Environments (CoRE
  • 10
    • 84879511633 scopus 로고    scopus 로고
    • A dtls based end-To-end security architecture for the internet of things with two-way authentication
    • T. Kothmayr, C. Schmitt, W. Hu, M. Bruenig, and G. Carle. "A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication". In Proc. of IEEE SenseApp, 2012
    • (2012) Proc. of IEEE SenseApp
    • Kothmayr, T.1    Schmitt, C.2    Hu., W.3    Bruenig, M.4    Carle, G.5
  • 14


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.