Tschofenig et al., 2016 - Google Patents
Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of thingsTschofenig et al., 2016
View HTML- Document ID
- 31287438779699854
- Author
- Tschofenig H
- Fossati T
- Publication year
External Links
Snippet
RFC 7925: Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles
for the Internet of Things [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] PROPOSED
STANDARD Internet Engineering Task Force (IETF) H. Tschofenig, Ed. Request for Comments …
- 238000004891 communication 0 description 33
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tschofenig et al. | Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things | |
Hummen et al. | Delegation-based authentication and authorization for the IP-based Internet of Things | |
US10601594B2 (en) | End-to-end service layer authentication | |
Keoh et al. | Securing the internet of things: A standardization perspective | |
Gurtov | Host identity protocol (HIP): towards the secure mobile internet | |
Dragomir et al. | A survey on secure communication protocols for IoT systems | |
US10097525B2 (en) | System, apparatus and method for generating dynamic IPV6 addresses for secure authentication | |
Kothmayr et al. | A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication | |
Granjal et al. | Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey | |
Pérez et al. | Application layer key establishment for end-to-end security in IoT | |
Fossati | RFC 7925: Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things | |
US20170201382A1 (en) | Secure Endpoint Devices | |
Park et al. | Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake | |
Yu et al. | Enabling end-to-end secure communication between wireless sensor networks and the Internet | |
Rizzardi et al. | Analysis on functionalities and security features of Internet of Things related protocols | |
Park | Security architecture for secure multicast coap applications | |
JP2016526844A (en) | Key establishment for constrained resource devices | |
Sahraoui et al. | Compressed and distributed host identity protocol for end-to-end security in the IoT | |
Kivinen | Minimal internet key exchange version 2 (ikev2) initiator implementation | |
Benslimane et al. | Efficient end-to-end secure key management protocol for internet of things | |
Schmitt et al. | Two-way authentication for the internet-of-things | |
Chavan et al. | Secure CoAP using enhanced DTLS for Internet of things | |
Hanna et al. | A comprehensive and realistic performance evaluation of post-quantum security for consumer IoT devices | |
Gao et al. | SecT: A lightweight secure thing-centered IoT communication system | |
Fuentes-Samaniego et al. | An analysis of secure m2m communication in wsns using dtls |