{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:58:28Z","timestamp":1740099508801,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304393"},{"type":"electronic","value":"9783030304409"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30440-9_17","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:13:03Z","timestamp":1567563183000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Verification of IoT Devices by Means of a Shared Secret"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1518-5848","authenticated-orcid":false,"given":"Tomasz","family":"Krokosz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7944-6061","authenticated-orcid":false,"given":"Jarogniew","family":"Rykowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014). Article number 6740844","journal-title":"IEEE Internet Things J."},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/ACCESS.2016.2529723","volume":"4","author":"Y Sun","year":"2016","unstructured":"Sun, Y., Song, H., Jara, A.J., Bie, R.: Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766\u2013773 (2016). Article number 7406686","journal-title":"IEEE Access"},{"key":"17_CR3","unstructured":"BLE documentation. \n                    https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=229737"},{"key":"17_CR4","unstructured":"BLE. \n                    http:\/\/microchipdeveloper.com\/wireless:ble-link-layer-channels"},{"issue":"2","key":"17_CR5","first-page":"483","volume":"151","author":"C-C Yang","year":"2004","unstructured":"Yang, C.-C., Chang, T.-Y., Hwang, M.-S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483\u2013490 (2004)","journal-title":"Appl. Math. Comput."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Stulman, A.: Spraying techniques for securing key exchange in large ad-hoc networks. In: 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015, Mexico (2015)","DOI":"10.1145\/2815317.2815324"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y.S., Deng, J., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 42\u201351 (2003)","DOI":"10.1145\/948117.948118"},{"key":"17_CR8","first-page":"1","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"Mihir Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1109, pp. 1\u201315 (1996)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Rykowski, J.: Multi-dimensional identification of things, places and humans. In: Proceedings of The 8th Annual IEEE International Conference on RFID Technology and Applications, IEEE RFID-TA 2017, Warsaw, 20\u201322 September 2017, pp. 152\u2013157 (2017)","DOI":"10.1109\/RFID-TA.2017.8098910"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.future.2019.01.050","volume":"98","author":"Z Ali","year":"2019","unstructured":"Ali, Z., Imran, M., McClean, S., Khan, N., Shoaib, M.: Protection of records and data authentication based on secret shares and watermarking. Future Gener. Comput. Syst. 98, 331\u2013341 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR11","unstructured":"How does Secure UUID work? Estimote Community. \n                    https:\/\/community.estimote.com\/hc\/en-us\/articles\/201371053-How-does-Secure-UUID-work"},{"key":"17_CR12","unstructured":"https:\/\/blog.estimote.com\/post\/172115262320\/presence-verification-and-security-is-more-refined"},{"key":"17_CR13","unstructured":"Secure UUID\/I don\u2019t understand how it works, Estimote programmer forum. \n                    https:\/\/forums.estimote.com\/t\/secure-uuid-i-dont-understand-how-it-works\/3769"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30440-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:22:19Z","timestamp":1567563739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30440-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030304393","9783030304409"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30440-9_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}