{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T17:22:14Z","timestamp":1725816134141},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319149769"},{"type":"electronic","value":"9783319149776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14977-6_3","type":"book-chapter","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T04:23:24Z","timestamp":1422419004000},"page":"33-48","source":"Crossref","is-referenced-by-count":23,"title":["Privacy and Security Challenges in Internet of Things"],"prefix":"10.1007","author":[{"given":"Manik Lal","family":"Das","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Sarma, S., Brock, D.L., Ashton, K.: The Networked Physical World. MIT Auto-ID Center (2000)"},{"key":"3_CR2","unstructured":"European Commission: Internet of Things - An action plan for Europe, http:\/\/europa.eu\/legislation_summaries\/information_society\/internet\/si0009_en.htm (accessed January 2014)"},{"key":"3_CR3","doi-asserted-by":"publisher","DOI":"10.1201\/9781420052824","volume-title":"The Internet Of Things","author":"L. Yan","year":"2008","unstructured":"Yan, L., Zhang, Y., Yang, L.T., Ning, H.: The Internet Of Things. Auerbach Publications, Taylor and Francis Group, New York (2008)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-41224-0_5","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"M.L. Das","year":"2013","unstructured":"Das, M.L.: Strong Security and Privacy of RFID System for Internet of Things Infrastructure. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE 2013. LNCS, vol.\u00a08204, pp. 56\u201369. Springer, Heidelberg (2013)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Callaway Jr., E.H.: Wireless Sensor Networks. Architectures and Protocols. Auerbach Publications (2003)","DOI":"10.1201\/9780203500705"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252 (June 2014), https:\/\/tools.ietf.org\/html\/rfc7252 (accessed July 2014)","DOI":"10.17487\/rfc7252"},{"key":"3_CR7","unstructured":"Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 4919 (August 2007), http:\/\/www.ietf.org\/rfc\/rfc4919.txt (accessed December 2013)"},{"issue":"9","key":"3_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R. Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer\u00a044(9), 51\u201358 (2011)","journal-title":"IEEE Computer"},{"key":"3_CR9","unstructured":"ISO\/IEC 14443-2:2001. Identification cards \u2013 Contactless integrated circuit(s) cards \u2013 Proximity cards \u2013 Part 2: Radio frequency power and signal interface"},{"key":"3_CR10","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)"},{"key":"3_CR11","unstructured":"ZigBee Specification, http:\/\/www.zigbee.org\/Specifications.aspx (accessed December 2013)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347 (April 2006), https:\/\/tools.ietf.org\/html\/rfc4347 (accessed December 2013)","DOI":"10.17487\/rfc4347"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol. RFC 5246 (August 2008), http:\/\/www.rfc-base.org\/txt\/rfc-5246.txt (accessed December 2013)","DOI":"10.17487\/rfc5246"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-319-12060-7_12","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"R. Songhela","year":"2014","unstructured":"Songhela, R., Das, M.L.: Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol.\u00a08804, pp. 171\u2013182. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14977-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T01:50:01Z","timestamp":1566265801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14977-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319149769","9783319149776"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14977-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}