{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:11:36Z","timestamp":1742969496349,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319934075"},{"type":"electronic","value":"9783319934082"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93408-2_15","type":"book-chapter","created":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T10:55:51Z","timestamp":1528196151000},"page":"207-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secured Domain of Sensor Nodes - A New Concept"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4853-7363","authenticated-orcid":false,"given":"Janusz","family":"Furtak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5129-0448","authenticated-orcid":false,"given":"Zbigniew","family":"Zieli\u0144ski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1352-9638","authenticated-orcid":false,"given":"Jan","family":"Chudzikiewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,6]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.procs.2014.07.091","volume":"34","author":"QA Al-Haija","year":"2014","unstructured":"Al-Haija, Q.A., Tarayrah, M.A., Al-Qadeeb, H., Al-Lwaimi, A.: Tiny RSA cryptosystem based on arduino microcontroller useful for small scale networks. Procedia Comput. Sci. 34, 639\u2013646 (2014). https:\/\/doi.org\/10.1016\/j.procs.2014.07.091","journal-title":"Procedia Comput. Sci."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Furtak, J., Zieli\u0144ski, Z., Chudzikiewicz, J.: Secure protocol for wireless communication within military IoT. In: 2015 IEEE 2nd World Forum on Internet of Things, WF-IoT 2015, pp. 508\u2013513 (2015)","DOI":"10.1109\/WF-IoT.2015.7389106"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Furtak, J., Zieli\u0144ski, Z., Chudzikiewicz, J.: Security techniques for the WSN link layer within military IoT. In: 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016, pp. 233\u2013238 (2016)","DOI":"10.1109\/WF-IoT.2016.7845508"},{"key":"15_CR4","unstructured":"IDQ, Quantis AIS31 Brochure https:\/\/marketing.idquantique.com\/acton\/attachment\/11868\/f-0220\/1\/-\/-\/-\/-\/Quantis%20AIS31_Brochure.pdf"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Jonsen, F.T., et al.: Application of IoT in Military Operations in a Smart City presented at the IEEE International Conference on 2018 Military Communications and Information Systems (2018)","DOI":"10.1109\/ICMCIS.2018.8398690"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/mdat.2017.2682234","volume":"34","author":"S Koteshwara","year":"2017","unstructured":"Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Tests 34(4), 26\u201333 (2017). https:\/\/doi.org\/10.1109\/mdat.2017.2682234","journal-title":"IEEE Des. Tests"},{"key":"15_CR7","unstructured":"Requirements For Cryptographic Modules. Federal Information Processing Standard (FIPS 140-2), National Institute of Standards and Technology, 03 December 2002"},{"issue":"1","key":"15_CR8","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/JIOT.2016.2618909","volume":"4","author":"D Puschmann","year":"2017","unstructured":"Puschmann, D., Barnaghi, P., Tafazolli, R.: Adaptive clustering for dynamic IoT data streams. IEEE Internet of Things J. 4(1), 64\u201374 (2017)","journal-title":"IEEE Internet of Things J."},{"key":"15_CR9","unstructured":"Trusted Computing Group. TPM Main Part 1 Design Principles. Specification Version 1.2. Revision 116, Trusted Computing Group, Incorporated (2011)"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93408-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:27:45Z","timestamp":1709821665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93408-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319934075","9783319934082"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93408-2_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations for Community Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u017dilina","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i4cs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fribot.sk\/i4cs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}