{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:02:56Z","timestamp":1751774576231,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319922126"},{"type":"electronic","value":"9783319922133"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92213-3_1","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T17:54:27Z","timestamp":1530640467000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Testbed for Secure Internet-of-Things"],"prefix":"10.1007","author":[{"given":"\u0218tefan-Ciprian","family":"Arseni","sequence":"first","affiliation":[]},{"given":"Alexandru","family":"Vulpe","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Halunga","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s12599-015-0383-3","volume":"57","author":"F Wortmann","year":"2015","unstructured":"Wortmann, F., Fl\u00fcchter, K.: Internet of Things - technology and value added. Bus. Inf. Syst. Eng. 57(3), 221\u2013224 (2015)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"7","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbia","year":"2013","unstructured":"Gubbia, J., Buyyab, R., Marusica, S., Palaniswamihuang, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR3","first-page":"626","volume-title":"Lecture Notes in Computer Science","author":"Ling Qian","year":"2009","unstructured":"Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview, cloud computing. In: Proceedings of The First International Conference CloudCom 2009, Beijing, China, 1\u20134 December 2009, pp. 626\u2013631 (2009)"},{"issue":"6","key":"1_CR4","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyyaa","year":"2009","unstructured":"Buyyaa, R., Yeoa, C.S., Venugopala, S., Broberga, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015)","journal-title":"Neural Netw."},{"issue":"7553","key":"1_CR6","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015). https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"issue":"7","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandia","year":"2012","unstructured":"Miorandia, D., Sicarib, S., De Pellegrinia, F., Chlamtaca, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., Donato, W., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and Internet of Things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Lane, N.D., Bhattacharya, S., Georgiev, P., Forlivesi, C., Kawsar, F.: An early resource characterization of deep learning on wearables, Smartphones and Internet-of-Things devices. In: Proceedings of the 2015 International Workshop on Internet of Things Towards Applications, 01 November 2015, Seoul, South Korea (2015). https:\/\/doi.org\/10.1145\/2820975.2820980","DOI":"10.1145\/2820975.2820980"},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"e0119044","DOI":"10.1371\/journal.pone.0119044","volume":"10","author":"X Ma","year":"2015","unstructured":"Ma, X., Yu, H., Wang, Y., Wang, Y.: Large-scale transportation network congestion evolution prediction using deep learning theory. PLoS ONE 10(3), e0119044 (2015). https:\/\/doi.org\/10.1371\/journal.pone.0119044","journal-title":"PLoS ONE"},{"issue":"11","key":"1_CR11","first-page":"64","volume":"92","author":"ME Porter","year":"2014","unstructured":"Porter, M.E., Heppelmann, J.E.: How smart, connected products are transforming competition. Harvard Bus. Rev. 92(11), 64\u201388 (2014)","journal-title":"Harvard Bus. Rev."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R.H.: Internet of Things \u2013 new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicaria","year":"2015","unstructured":"Sicaria, S., Rizzardia, A., Griecob, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yana","year":"2014","unstructured":"Yana, Z., Zhangc, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"1_CR17","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Romana","year":"2013","unstructured":"Romana, R., Zhoua, J., Lopezb, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"key":"1_CR18","unstructured":"Poschmann, A.Y.: Lightweight cryptography: cryptographic engineering for a pervasive world. Ph.D. thesis (2009)"},{"key":"1_CR19","unstructured":"Masanobu, K., Moriai, S.: Lightweight cryptography for the Internet of Things. Sony Corporation (2008). https:\/\/pdfs.semanticscholar.org\/9595\/b5b8db9777d5795625886418d38864f78bb3.pdf"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-54568-9_21","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"C Manifavas","year":"2014","unstructured":"Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems \u2013 a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, William M. (eds.) DPM\/SETOP -2013. LNCS, vol. 8247, pp. 333\u2013349. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54568-9_21"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Arseni, S., Mi\u021boi, M., Vulpe, A.: PASS-IoT: a platform for studying security, privacy and trust in IoT. In: 11th International Conference on Communications (COMM 2016), Bucharest, Romania, 9\u201311 June 2016 (2016). ISBN: 978-1-4673-8196-3","DOI":"10.1109\/ICComm.2016.7528258"},{"issue":"6","key":"1_CR22","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Sandeep, K.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 222\u2013533 (2007)","journal-title":"IEEE Des. Test Comput."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Panasayya, Y., Kaps, J.-P.: Lightweight cryptography for FPGAs. In: 2009 Proceedings of International Conference on Reconfigurable Computing and FPGAs, ReConFig 2009, pp. 225\u2013230. IEEE (2009)","DOI":"10.1109\/ReConFig.2009.54"},{"issue":"1","key":"1_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s13389-011-0005-z","volume":"1","author":"H C\u00e9dric","year":"2011","unstructured":"C\u00e9dric, H., Kamel, D., Regazzoni, F., Legat, J.-D., Flandre, D., Bol, D., Standaert, F.-X.: Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low- voltage 65\u00a0nm AES coprocessor for passive RFID tags. J. Cryptograph. Eng. 1(1), 79\u201386 (2011)","journal-title":"J. Cryptograph. Eng."},{"issue":"2","key":"1_CR25","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/LES.2014.2314961","volume":"6","author":"A Aydin","year":"2014","unstructured":"Aydin, A., Gulcan, E., Schaumont, P.: SIMON says: break area records of block ciphers on FPGAs. IEEE Embed. Syst. Lett. 6(2), 37\u201340 (2014)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Vivek, V., Shila, D.M.: High throughput implementations of cryptography algorithms on GPU and FPGA. In: 2013 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 723\u2013727. IEEE (2013)","DOI":"10.1109\/I2MTC.2013.6555510"},{"key":"1_CR27","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-56538-5_11","volume-title":"Recent Advances in Information Systems and Technologies","author":"A Vulpe","year":"2017","unstructured":"Vulpe, A., Arseni, \u015e.-C., Marcu, I., Voicu, C., Fratu, O.: Building a unified middleware architecture for security in IoT. In: Rocha, \u00c1., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 570, pp. 105\u2013114. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56538-5_11"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92213-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T14:57:29Z","timestamp":1751727449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92213-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319922126","9783319922133"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92213-3_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}