-
1
-
-
84955468238
-
Transport layer security (TLS) extensions: Extension definitions
-
Jan
-
D. Eastlake, III, Transport layer security (TLS) extensions: Extension definitions. RFC 6066, Jan. 2011
-
(2011)
RFC 6066
-
-
Eastlake, D.1
-
3
-
-
33746205145
-
-
Aug
-
J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman, MIKEY: Multimedia Internet KEYing. RFC 3830, Aug. 2004
-
(2004)
MIKEY: Multimedia Internet KEYing. RFC 3830
-
-
Arkko, J.1
Carrara, E.2
Lindholm, F.3
Naslund, M.4
Norrman, K.5
-
5
-
-
44949237454
-
-
RFC 4492 May
-
S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller, Elliptic curve cryptography (ECC) cipher suites for transport layer Security (TLS). RFC 4492, May 2006
-
(2006)
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS
-
-
Blake-Wilson, S.1
Bolyard, N.2
Gupta, V.3
Hawk, C.4
Moeller, B.5
-
6
-
-
84961245955
-
-
Cisco Jan]. Available
-
Cisco. (2014, Jan.). The Internet of Things [Online]. Available: http://share. cisco.com/internet-of-things.html
-
(2014)
The Internet of Things [Online
-
-
-
9
-
-
81255188333
-
-
Ericsson Ericsson White Paper 284 23-3149 Uen Feb
-
Ericsson, More than 50 billion connected devices. Ericsson White Paper 284 23-3149 Uen, Feb. 2011
-
(2011)
More Than 50 Billion Connected Devices
-
-
-
15
-
-
84977958907
-
Practical issues with datagram transport layer security in constrained environments
-
K. Hartke, Practical issues with datagram transport layer security in constrained environments. Draft-hartke-dice-practicalissues-00, IETF, 2012
-
(2012)
Draft-hartke-dice-practicalissues-00, IETF
-
-
Hartke, K.1
-
17
-
-
84883253704
-
Compression format for IPv6 datagrams over
-
FC 6282 (Proposed Standard Sep
-
J. Hui and P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282 (Proposed Standard), Sep. 2011
-
(2011)
IEEE 802.15.4-based Networks
-
-
Hui, J.1
Thubert, P.2
-
24
-
-
84977958526
-
-
S. L. Keoh, S. S. Kumar, O. Garcia-Morchon, and E. Dijk, DTLS-based multicast security for low-power and lossy networks. Draft-keoh-dicemulticast-security-06, IETF, 2013
-
(2013)
DTLS-based Multicast Security for Low-power and Lossy Networks. Draft-keoh-dicemulticast-security-06, IETF
-
-
Keoh, S.L.1
Kumar, S.S.2
Garcia-Morchon, O.3
Dijk, E.4
-
29
-
-
51249107460
-
-
Aug
-
N. Kushalnagar, G. Montenegro, and C. Schumacher, IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC 4919, Aug. 2007
-
(2007)
IPv6 over Low-power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. RFC 4919
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
30
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. in Proc. Int. Conf. Inf. Process. Sensor Netw. (IPSN?08), 2008, pp. 245-256
-
(2008)
Proc. Int. Conf. Inf. Process. Sensor Netw. (IPSN?08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
37
-
-
0005505737
-
-
OMA WAPForum Ltd., Tech. Rep. WAP-261-102-WTLS-20011027-a
-
OMA,Wireless transport layer security (WTLS),WAPForum Ltd., Tech. Rep. WAP-261-102-WTLS-20011027-a, 2001
-
(2001)
Wireless Transport Layer Security (WTLS)
-
-
-
38
-
-
33750985647
-
-
Jun
-
A. Perrig, D. Song, R. Canetti, J. D. Tygar, and B. Briscoe, Timed efficient stream loss-tolerant authentication (TESLA). RFC 4082, Jun. 2005
-
(2005)
Timed Efficient Stream Loss-tolerant Authentication (TESLA). RFC 4082
-
-
Perrig, A.1
Song, D.2
Canetti, R.3
Tygar, J.D.4
Briscoe, B.5
-
41
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the Internet of Things
-
Oct
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, Lithe: Lightweight secure CoAP for the Internet of Things. IEEE Sensors J, vol. 13, no. 10, pp. 3711-3720, Oct. 2013
-
(2013)
IEEE Sensors J
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
45
-
-
67649560482
-
Integrating wireless sensor networks and the internet: A security analysis
-
R. Roman and J. Lopez, Integrating wireless sensor networks and the internet: A security analysis. Internet Res, vol. 19, no. 2, pp. 246-259, 2009
-
(2009)
Internet Res
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
-
46
-
-
80052854156
-
Securing the internet of things
-
Sep
-
R. Roman, P. Najera, and J. Lopez, Securing the Internet of Things. IEEE Comput, vol. 44, no. 9, pp. 51-58, Sep. 2011
-
(2011)
IEEE Comput
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
51
-
-
84977945705
-
-
P. Wouters, H. Tschofenig, J. Gilmore, S. Weiler, and T. Kivinen, Using raw public keys in TLS and DTLS. Draft-ietf-tls-oob-pubkey-10, IETF, 2013
-
(2013)
Using Raw Public Keys in TLS and DTLS. Draft-ietf-tls-oob-pubkey-10, IETF
-
-
Wouters, P.1
Tschofenig, H.2
Gilmore, J.3
Weiler, S.4
Kivinen, T.5
|