共 8 条
[1]
[Anonymous], 2010, P INT C WIR UB SYST
[2]
Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
[J].
SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION,
2015,
:603-604
[4]
Rescorla E., 2019, DATAGRAM TRANSPORT L
[5]
Rescorla Eric, 2018, RFC 8446, DOI [10.17487/RFC8446, DOI 10.17487/RFC8446]
[6]
Wang X J, 2018, INT J NAVAL ARCHITEC, V2, P1, DOI [DOI 10.1097/SHK.0000000000001116, DOI 10.1002/adma.201800074]
[7]
wolfSSL, 2019, WOLFSSL EMB SSL TLS
[8]
Yuan Q., 2005, IACR CRYPTOLOGY EPRI, V2005