{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:18Z","timestamp":1771697478780,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642384004","type":"print"},{"value":"9783642384011","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38401-1_11","type":"book-chapter","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T04:53:08Z","timestamp":1369803188000},"page":"140-153","source":"Crossref","is-referenced-by-count":27,"title":["Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications"],"prefix":"10.1007","author":[{"given":"Jorge","family":"Granjal","sequence":"first","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Jorge S\u00e1","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"TelosB Mote Platform, \n                    \n                      http:\/\/www.xbow.com\/pdf\/Telos_PR.pdf"},{"key":"11_CR2","unstructured":"Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE std. 802.15.4 (2006)"},{"key":"11_CR3","unstructured":"IPv6 over Low power WPAN (6lowpan), \n                    \n                      https:\/\/datatracker.ietf.org\/wg\/6lowpan\/charter\/"},{"key":"11_CR4","unstructured":"Constrained RESTful Environments (core), \n                    \n                      https:\/\/datatracker.ietf.org\/wg\/core\/charter\/"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Shelby, Z., et al.: Constrained Application Protocol (CoAP), draft-ietf-core-coap-13 (2013)","DOI":"10.17487\/rfc7252"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Rescorla, E., et al.: Datagram Transport Layer Security Version 1.2, RFC 6347 (2012)","DOI":"10.17487\/rfc6347"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, V., et al.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. In: Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), Kauai Island, HI, USA (2005), doi:10.1109\/PERCOM.2005.41","DOI":"10.1109\/PERCOM.2005.41"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Jung, et al.: SSL-based Lightweight Security of IP-based Wireless Sensor Networks. In: Proceedings of the International Conference on Advanced Information Networking and Applications Workshop (WAINA 2009), Bradford, UK (2009)","DOI":"10.1109\/WAINA.2009.47"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Raza, S., et al.: 6LoWPAN Compressed DTLS for CoAP. In: Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS 2012), Hangzhou, China (2012), doi:10.1109\/DCOSS.2012.55","DOI":"10.1109\/DCOSS.2012.55"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., et al.: A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication. In: Proceedings of the Seventh IEEE International Workshop on Practical Issues in Building Sensor Network Applications (IEEE SenseApp 2012), Clearwater, FL, USA (2012)","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"11_CR11","unstructured":"Yegin, A., Shelby, Z.: CoAP Security Options, draft-yegin-coap-security-options-00 (expired April 2012)"},{"key":"11_CR12","unstructured":"Hui, J., et al.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks, RFC 6282 (2011)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"McGrew, D., Beiley, D.: AES-CCM Cipher Suites for Transport Layer Security (TLS), RFC 6655 (2012)","DOI":"10.17487\/rfc6655"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38401-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T11:48:17Z","timestamp":1557748097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38401-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384004","9783642384011"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38401-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}