{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:55:18Z","timestamp":1762509318804},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_26","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"287-296","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of an IoT-Based Efficient Security Scheme in Home Wireless System"],"prefix":"10.1007","author":[{"given":"Fei","family":"Ding","sequence":"first","affiliation":[]},{"given":"Zhiliang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chengwan","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Ruoyu","family":"Su","sequence":"additional","affiliation":[]},{"given":"Dengyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/TASE.2017.2778303","volume":"15","author":"F Ding","year":"2018","unstructured":"Ding, F., Song, A.G., Zhang, D.Y., Tong, E., Pan, Z.W., You, Y.H.: Interference-aware wireless network for home monitoring and performance evaluation. IEEE Trans. Autom. Sci. Eng. 15(3), 1286\u20131297 (2018)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1587\/transcom.2015EBP3235","volume":"E99-B","author":"J Su","year":"2016","unstructured":"Su, J., Hong, D., Tang, J.L., Chen, H.P.: An efficient anti-collision algorithm based on improved collision detection scheme. IEICE Trans. Commun. E99-B(2), 465\u2013469 (2016)","journal-title":"IEICE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"Sultana, S., Akand, T., Dey, M.: Design and implementation of home security system using PZT. In: Proceedings of the 9th International Conference on Electrical and Computer Engineering (ICECE), 13 February 2017, pp. 554\u2013557 (2017)","key":"26_CR3","DOI":"10.1109\/ICECE.2016.7853980"},{"issue":"3","key":"26_CR4","doi-asserted-by":"publisher","first-page":"170","DOI":"10.25103\/jestr.103.22","volume":"10","author":"E Isa","year":"2017","unstructured":"Isa, E., Sklavos, N.: Smart home automation: GSM security system design & implementation. J. Eng. Sci. Technol. Rev. 10(3), 170\u2013174 (2017)","journal-title":"J. Eng. Sci. Technol. Rev."},{"doi-asserted-by":"crossref","unstructured":"Kulsiriruangyos, J., Rattanawutikul, V., Sangsartra, P., Wongsawang, D.: Home security system for alone elderly people. In: Proceedings of the 5th ICT International Student Project Conference (ICT-ISPC), 22 July 2016, pp. 65\u201368 (2016)","key":"26_CR5","DOI":"10.1109\/ICT-ISPC.2016.7519237"},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSPEC.2016.7367451","volume":"53","author":"GW Wayt","year":"2016","unstructured":"Wayt, G.W.: DIY home security: deter intruders with an extra loud alarm. IEEE Spectr. 53(1), 20\u201321 (2016)","journal-title":"IEEE Spectr."},{"issue":"4","key":"26_CR7","first-page":"1751","volume":"10","author":"M Sahani","year":"2016","unstructured":"Sahani, M., Subudhi, S., Mohanty, M.N.: Design of face recognition based embedded home security system. KSII Trans. Internet Inf. Syst. 10(4), 1751\u20131767 (2016)","journal-title":"KSII Trans. Internet Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Peter, S., Gopal, R.K.: Multi-level authentication system for smart home-security analysis and implementation. In: Proceedings of the International Conference on Inventive Computation Technologies (ICICT), 18 January 2017, vol. 2 (2017)","key":"26_CR8","DOI":"10.1109\/INVENTIVE.2016.7824790"},{"issue":"13","key":"26_CR9","doi-asserted-by":"publisher","first-page":"4269","DOI":"10.1109\/JSEN.2017.2705045","volume":"17","author":"AC Jose","year":"2017","unstructured":"Jose, A.C., Malekian, R.: Improving smart home security: integrating logical sensing into smart home. IEEE Sens. J. 17(13), 4269\u20134286 (2017)","journal-title":"IEEE Sens. J."},{"doi-asserted-by":"crossref","unstructured":"Chilipirea, C., Ursache, A., Popa, D.O., Pop, F.: Energy efficiency and robustness for IoT: Building a smart home security system. In: Proceedings - IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 7 November 2016, pp. 43\u201348 (2016)","key":"26_CR10","DOI":"10.1109\/ICCP.2016.7737120"},{"issue":"1","key":"26_CR11","first-page":"137","volume":"55","author":"DH Li","year":"2018","unstructured":"Li, D.H., Zhang, G.Z., Xu, Z.: Modelling the roles of cewebrity trust and platform trust in consumers\u2019 propensity of live-streaming: an extended TAM method. CMC Comput. Mater. Continua 55(1), 137\u2013150 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"issue":"1","key":"26_CR12","first-page":"83","volume":"54","author":"G Jayaprakash","year":"2018","unstructured":"Jayaprakash, G., Muthuraj, M.P.: Prediction of compressive strength of various SCC mixes using relevance vector machine. CMC Comput. Mater. Continua 54(1), 83\u2013102 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"key":"26_CR13","first-page":"10","volume":"2016","author":"F Ding","year":"2016","unstructured":"Ding, F., Song, A.G., Tong, E., Li, J.Q.: A smart gateway architecture for improving efficiency of home network applications. J. Sens. 2016, 10 (2016). Article ID 2197237","journal-title":"J. Sens."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:32:04Z","timestamp":1563391924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}