{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:44:55Z","timestamp":1726407895582},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_2","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T15:52:06Z","timestamp":1544025126000},"page":"24-43","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks"],"prefix":"10.1007","author":[{"given":"Bhagyesh","family":"Patil","sequence":"first","affiliation":[]},{"given":"Parjanya","family":"Vyas","sequence":"additional","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"2_CR1","unstructured":"Amazon key. https:\/\/www.amazon.com\/key . Accessed 25 July 2018"},{"key":"2_CR2","unstructured":"August. https:\/\/www.august.com\/ . Accessed 24 July 2018"},{"key":"2_CR3","unstructured":"Danalock. https:\/\/www.danalock.com\/ . Accessed 24 July 2018"},{"key":"2_CR4","unstructured":"Gamebench. https:\/\/www.gamebench.net\/ . Accessed 29 July 2018"},{"key":"2_CR5","unstructured":"Geo-fencing. https:\/\/en.wikipedia.org\/wiki\/Geo-fence . Accessed 26 July 2018"},{"key":"2_CR6","unstructured":"Kwikset kevo smart lock. http:\/\/www.kwikset.com\/kevo\/default . Accessed 24 July 2018"},{"key":"2_CR7","unstructured":"Okidokeys. https:\/\/www.okidokeys.com\/ . Accessed 24 July 2018"},{"key":"2_CR8","unstructured":"Uuid. https:\/\/en.wikipedia.org\/wiki\/Universally_unique_identifier . Accessed 26 July 2018"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Arora, N., Shyamasundar, R.: PGSP: a protocol for secure communication in peer-to-peer system. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2094\u20132099. IEEE (2005)","DOI":"10.1109\/WCNC.2005.1424841"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Lessons learned from the deployment of a smart phone-based access-control system. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 64\u201375. ACM (2007)","DOI":"10.1145\/1280680.1280689"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/11556992_31","volume-title":"Information Security","author":"L Bauer","year":"2005","unstructured":"Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey system. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431\u2013445. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11556992_31"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"Encyclopedia of Cryptography and Security","author":"A Biryukov","year":"2011","unstructured":"Biryukov, A.: Chosen plaintext attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 205\u2013206. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5"},{"key":"2_CR13","unstructured":"CBray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (2008)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-39200-9_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"R Canetti","year":"2003","unstructured":"Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255\u2013271. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_16"},{"key":"2_CR15","unstructured":"Denning, T., Kohno, T.: Empowering consumer electronic security and privacy choices: navigating the modern home. In: Symposium on Usable Privacy and Security (SOUPS) (2013)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636\u2013654. IEEE (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"2_CR17","unstructured":"Gonikberg, M.: Wlan-based positioning system. US Patent 9,125,165, 1 September 2015"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461\u2013472. ACM (2016)","DOI":"10.1145\/2897845.2897886"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-72344-0_5","volume-title":"Distributed Computing and Internet Technology","author":"S Khobragade","year":"2018","unstructured":"Khobragade, S., Narendra Kumar, N.V., Shyamasundar, R.K.: Secure synthesis of IoT via readers-writers flow model. In: Negi, A., Bhatnagar, R., Parida, L. (eds.) ICDCIT 2018. LNCS, vol. 10722, pp. 86\u2013104. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-72344-0_5"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Kim, T.H.J., Bauer, L., Newsome, J., Perrig, A., Walker, J.: Challenges in access right assignment for secure home networks. In: HotSec (2010)","DOI":"10.1109\/JCN.2011.6157417"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-28628-8_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"K Kurosawa","year":"2004","unstructured":"Kurosawa, K., Desmedt, Y.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426\u2013442. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_26"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Mittal, Y., Toshniwal, P., Sharma, S., Singhal, D., Gupta, R., Mittal, V.K.: A voice-controlled multi-functional smart home automation system. In: 2015 Annual IEEE India Conference (INDICON), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/INDICON.2015.7443538"},{"key":"2_CR23","unstructured":"Mohebbi, B.B.: Short range booster with multiple antennas. US Patent 8,478,191, 2 July 2013"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology \u2014 CRYPTO 91","author":"C Rackoff","year":"1992","unstructured":"Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433\u2013444. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_35"},{"key":"2_CR25","unstructured":"Ur, B., Jung, J., Schechter, S.: The current state of access control for smart devices in homes. In: Workshop on Home Usable Privacy and Security (HUPS), HUPS 2014 (2013)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Ye, M., Jiang, N., Yang, H., Yan, Q.: Security analysis of internet-of-things: a case study of august smart lock. In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 499\u2013504. IEEE (2017)","DOI":"10.1109\/INFCOMW.2017.8116427"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:24:56Z","timestamp":1573071896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}