共 24 条
[1]
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2015, 17 (04)
:2347-2376
[2]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[3]
[Anonymous], 2012, WORKSH SMART OBJ SEC
[4]
Cremers C.J.F., 2006, Scyther: Semantics and verification of security protocols
[6]
Gheorghe L., 2010, Proceedings of the Fifth International Conference on Systems and Networks Communications (ICSNC 2010), P7, DOI 10.1109/ICSNC.2010.9
[7]
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis
[J].
IEEE INTERNET OF THINGS JOURNAL,
2014, 1 (05)
:384-398
[8]
Hussen HR, 2013, INT CONF UBIQ FUTUR, P246, DOI 10.1109/ICUFN.2013.6614820
[9]
Instruments T., 2014, CC2520 DAT 2007
[10]
Jara A. J., 2011, Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), P491, DOI 10.1109/IMIS.2011.150