Security protocols in constrained environments
Leo Embedded Solutions
Chris Swan's presentation for Thingmonk 2014 - security protocols in constrained environments