{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:44:03Z","timestamp":1725857043998},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319401133"},{"type":"electronic","value":"9783319401140"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40114-0_21","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T07:00:37Z","timestamp":1464332437000},"page":"189-196","source":"Crossref","is-referenced-by-count":4,"title":["Hash-Chain Based Authentication for IoT Devices and REST Web-Services"],"prefix":"10.1007","author":[{"given":"Ant\u00f3nio","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Costa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,28]]},"reference":[{"issue":"9","key":"21_CR1","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of things. International Journal of Communication Systems 25(9), 1101\u20131102 (2012)","journal-title":"International Journal of Communication Systems"},{"key":"21_CR2","unstructured":"ABIresearch, The internet of things will drive wireless connected devices to 40.9 billion in 2020 (2014)"},{"key":"21_CR3","unstructured":"Press, G.: It\u2019s Official: The Internet of Things Takes Over Big Data as the Most Hyped Technology (2014)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Costa, R., Pinto, A.: A framework for the secure storage of data generated in the iot. Advances in Intelligent and Soft Computing (2015)","DOI":"10.1007\/978-3-319-19695-4_18"},{"key":"21_CR5","unstructured":"Leach, P.J., Franks, J., Luotonen, A., Hallam-Baker, P.M., Lawrence, S.D., Hostetler, J.L., Stewart, L.C.: HTTP Authentication: Basic and Digest Access Authentication"},{"key":"21_CR6","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework"},{"key":"21_CR7","unstructured":"Hardt, D., Jones, M.: The OAuth 2.0 Authorization Framework: Bearer Token Usage"},{"key":"21_CR8","unstructured":"Fielding, R., Reschke, J.: Hypertext Transfer Protocol (HTTP\/1.1): Authentication"},{"key":"21_CR9","unstructured":"Jammer-Lahav, E.: The OAuth 1.0 Protocol"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Peng, D., Li, C., Huo, H.: An extended usernametoken-based approach for REST-style web service security authentication. In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009, pp. 582\u2013586, August 2009","DOI":"10.1109\/ICCSIT.2009.5234805"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P.C., Kouchnarenko, O., Mantovani, J.: The Avispa Tool for the Automated Validation of Internet Security Protocols and Applications, vol. 5, pp. 281\u2013285. Springer (2005)","DOI":"10.1007\/11513988_27"},{"key":"21_CR12","unstructured":"Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Mantovani, J., Modersheim, S., Vigneron, L.: A high level protocol specification language for industrial security-sensitive protocols. In: Proc. SAPS, vol. 4, pp. 193\u2013205"},{"key":"21_CR13","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29, 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR14","series-title":"Lecture Notes Electrical Engineering","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-540-77887-5_1","volume-title":"Content Delivery Networks","author":"M Pathan","year":"2008","unstructured":"Pathan, M., Buyya, R., Vakali, A.: Content delivery networks: state of the art, insights, and imperatives. In: Buyya, R., Pathan, M., Vakali, A. (eds.) Content Delivery Networks. Lecture Notes Electrical Engineering, vol. 9, pp. 3\u201332. Springer, Heidelberg (2008)"},{"key":"21_CR15","unstructured":"Stevens, M.M.J.: Fast Collision Attack on MD5, tech. rep., March 2006"},{"key":"21_CR16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s11390-007-9010-1","volume":"22","author":"J Liang","year":"2007","unstructured":"Liang, J., Lai, X.-J.: Improved Collision Attack on Hash Function MD5. Journal of Computer Science and Technology 22, 79\u201387 (2007)","journal-title":"Journal of Computer Science and Technology"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology\u2013CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) Advances in Cryptology\u2013CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005)"}],"container-title":["Advances in Intelligent Systems and Computing","Ambient Intelligence- Software and Applications \u2013 7th International Symposium on Ambient Intelligence (ISAmI 2016)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40114-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T11:12:46Z","timestamp":1498302766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40114-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319401133","9783319401140"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40114-0_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}