Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
Paul WoutersHannes TschofenigJohn GilmoreSamuel WeilerTero KivinenPublished in: RFC (2014)
Keyphrases
- transport layer
- network layer
- physical layer
- end to end
- application layer
- intrusion detection
- network monitoring
- information security
- network security
- network architecture
- security issues
- access control
- cross layer
- computer networks
- routing protocol
- key management
- security policies
- distributed systems
- rate control
- congestion control
- wireless communication