Publisher
Springer Nature Singapore
Reference26 articles.
1. Arfaoui, G., Bultel, X., Fouque, P.A., Nedelcu, A., Onete, C.: The privacy of the TLS 1.3 protocol. Proc. Priv. Enhancing Technol. 4, 190–210 (2019)
2. Lecture Notes in Computer Science;M Bellare,1994
3. Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. RFC 7228 (informational), March 2014. http://www.ietf.org/rfc/rfc7228.txt
4. de Carvalho Silva, J., Rodrigues, J.J., Alberti, A.M., Solic, P., Aquino, A.L.: LoRaWAN-a low power WAN protocol for Internet of Things: a review and opportunities. In: 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp. 1–6. IEEE (2017)
5. Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280 (proposed standard), May 2008. http://www.ietf.org/rfc/rfc5280.txt