共 24 条
[11]
KRENTZ K.-F., 2015, Proceedings of the 31st Annual Computer Security Applications Conference, P121
[12]
KRENTZ K.-F., 2013, Proceedings of the International Workshop on Adaptive Security, P1
[14]
A hierarchy of authentication specifications
[J].
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
1997,
:31-43
[15]
Mahmoud R, 2015, INT CONF INTERNET, P336, DOI 10.1109/ICITST.2015.7412116
[20]
6LoWPAN Compressed DTLS for CoAP
[J].
2012 IEEE 8TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS),
2012,
:287-289