-
3
-
-
84899008089
-
Security Analysis of The Constrained Application Protocol In The Internet Of Things
-
London
-
Alghamdi T., Lasebae A., and Aiash M., “Security Analysis of The Constrained Application Protocol In The Internet Of Things,” in Proceedings of Second International Conference on Future Generation Communication Technology, London, pp. 163-168, 2013.
-
(2013)
Proceedings of Second International Conference on Future Generation Communication Technology
, pp. 163-168
-
-
Alghamdi, T.1
Lasebae, A.2
Aiash, M.3
-
6
-
-
85050453018
-
-
Technical Report
-
Cao Z., Kovatsch M., Tian H., and He X., “Energy Efficient Implementation of IETF Constrained Protocol Suite Draft-Ietflwig-Energy-Efficient-00,” Technical Report, 2014.
-
(2014)
Energy Efficient Implementation of IETF Constrained Protocol Suite Draft-Ietflwig-Energy-Efficient-00
-
-
Cao, Z.1
Kovatsch, M.2
Tian, H.3
He, X.4
-
7
-
-
84890523909
-
Integrating Wireless Sensor Networks With The Web
-
Chicago
-
Colitti, W., Steenhaut, K., and De Caro, N. “Integrating Wireless Sensor Networks With The Web,” in Proceedings of Extending the Internet to Low power and Lossy Networks, Chicago, 2011.
-
(2011)
Proceedings of Extending the Internet to Low Power and Lossy Networks
-
-
Colitti, W.1
Steenhaut, K.2
de Caro, N.3
-
9
-
-
85050508563
-
-
Last Visited
-
Dunkels, A., http://www.contiki-os.org/, Last Visited, 2017.
-
(2017)
-
-
Dunkels, A.1
-
10
-
-
85050466777
-
-
Last Visited
-
Kinney P, http://www.ieee802.org/15/pub/TG4.html, Last Visited, 2016.
-
(2016)
-
-
Kinney, P.1
-
13
-
-
84885304488
-
DTLS Based Security and Two-Way Authentication for the Internet of Things
-
Kothmayr T., Schmitt C., Hu W., Brunig M., and Carle G., “DTLS Based Security and Two-Way Authentication for the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2710-2723, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
17
-
-
84883314073
-
Lithe: “Lightweight Secure Coap For The Internet Of Things
-
Raza S., Shafagh H., Hewage K., Hummen R., and Voigt T., Lithe: “Lightweight Secure Coap For The Internet Of Things,” IEEE Sensors Journal, vol.13, no.10, pp. 3711-3720, 2013.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
18
-
-
84915774631
-
Lightweight security scheme for IoT applications using CoAP
-
Ukil A., Bandyopadhyay S., Bhattacharyya A., Pal A., and Bose T. “Lightweight security scheme for IoT applications using CoAP,” International Journal of Pervasive Computing And Comunications, vol. 10, no. 4, pp. 372-392, 2014.
-
(2014)
International Journal of Pervasive Computing and Comunications
, vol.10
, Issue.4
, pp. 372-392
-
-
Ukil, A.1
Bandyopadhyay, S.2
Bhattacharyya, A.3
Pal, A.4
Bose, T.5
|