{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:18Z","timestamp":1773510978506,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319937960","type":"print"},{"value":"9783319937977","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93797-7_14","type":"book-chapter","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T16:54:11Z","timestamp":1532105651000},"page":"123-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Lightweight X.509 Digital Certificates for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Filip","family":"Forsby","sequence":"first","affiliation":[]},{"given":"Martin","family":"Furuhed","sequence":"additional","affiliation":[]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,17]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252, June 2014. http:\/\/www.ietf.org\/rfc\/rfc7252.txt","DOI":"10.17487\/rfc7252"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Schaad, J.: CBOR Object Signing and Encryption (COSE). RFC 8152, July 2017","DOI":"10.17487\/RFC8152"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Raza, S., Helgason, T., Papadimitratos, P., Voigt, T.: SecureSense: end-to-end secure communication architecture for the cloud-connected internet of things. Elsevier, June 2017. https:\/\/doi.org\/10.1016\/j.future.2017.06.008","DOI":"10.1016\/j.future.2017.06.008"},{"issue":"12","key":"14_CR4","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1002\/sec.406","volume":"7","author":"S Raza","year":"2014","unstructured":"Raza, S., Duquennoy, S., H\u00f6glund, J., Roedig, U., Voigt, T.: Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. 7(12), 2654\u20132668 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"14_CR5","doi-asserted-by":"crossref","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the Internet of Things. IEEE Sens. J. 13(10), 3711\u20133720 (2013)","journal-title":"IEEE Sens. J."},{"key":"14_CR6","unstructured":"Pritikin, M., McGrew, D.: The Compressed X.509 Certificate Format, May 2010"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Deutsch, P.: RFC 1951 - DEFLATE Compressed Data Format Specification version 1.3, May 1996","DOI":"10.17487\/rfc1951"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Housley, P., Ford, W., Polk, T., Solo, D.: Internet X.509 public key infrastructure certificate and CRL profile. RFC 2459, RFC Editor, January 1999. http:\/\/www.rfc-editor.org\/rfc\/rfc2459.txt","DOI":"10.17487\/rfc2459"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Tschofenig, H., Fossati, T.: Transport layer security (TLS)\/datagram transport layer security (DTLS) profiles for the Internet of Things. RFC 7925, RFC Editor, July 2016","DOI":"10.17487\/RFC7925"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, T.: Internet Key Exchange Protocol Version 2 (IKEv2). STD 79, RFC Editor, October 2014. http:\/\/www.rfc-editor.org\/rfc\/rfc7296.txt","DOI":"10.17487\/rfc7296"},{"key":"14_CR11","unstructured":"International Telecommunication Union ITU. Introduction to ASN.1"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Bormann, C., Hoffman, P.: RFC 7049 - concise Binary Object Representation (CBOR), October 2013","DOI":"10.17487\/rfc7049"},{"key":"14_CR13","unstructured":"W3Schools. JSON Introduction"},{"key":"14_CR14","unstructured":"Vigano, C., Birkholz, H.: CBOR data definition language (CDDL): a notational convention to express CBOR data structures, September 2016"},{"key":"14_CR15","unstructured":"Kushalnagar, N., et al.: RFC 4944 - transmission of IPv6 Packets over IEEE 802.15.4 Networks, September 2007"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP), March 2013","DOI":"10.17487\/rfc7252"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: RFC 6347 - Datagram Transport Layer Security Version 1.2, January 2012","DOI":"10.17487\/rfc6347"},{"key":"14_CR18","unstructured":"Lambert, K.A.: Guidelines for 64-bit Global Identifier (EUI-64), January 2015"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO 1985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"key":"14_CR20","unstructured":"Brown, D.R.L.: Standards for Efficient Cryptography 1 (SEC 1), May 2009"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Turner, S., Yiu, K., Brown, D.R.L., Housley, R., Polk, T.: RFC 5480 - Elliptic Curve Cryptography Subject Public Key Information, March 2009","DOI":"10.17487\/rfc5480"},{"key":"14_CR22","unstructured":"Vanstone, S.A.: Compressed ECDSA signatures, November 2007"},{"key":"14_CR23","unstructured":"Texas Instruments. CC2538 Powerful Wireless Microcontroller System-On-Chip for 2.4-GHz IEEE 802.15.4, 6lowpan, and ZigBee\u00a9 Applications, December 2012"},{"key":"14_CR24","unstructured":"Zolertia, S.L.: Firefly - Zolertia\/Resources Wiki, January 2017. https:\/\/github.com\/Zolertia\/Resources\/wiki\/Firefly"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93797-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T03:09:21Z","timestamp":1571627361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93797-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937960","9783319937977"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93797-7_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}