{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:45Z","timestamp":1755993705971,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ants47819.2019.9117946","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T17:52:26Z","timestamp":1592329946000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Remote Attestation based Software Integrity of IoT devices"],"prefix":"10.1109","author":[{"given":"Shyam","family":"Sundar","sequence":"first","affiliation":[{"name":"Sri Sathya Sai Institute of Higher Learning,Department of Physics,Prasanthi Nilayam,Andhra Pradesh,India"}]},{"given":"Prabhakara","family":"Yellai","sequence":"additional","affiliation":[{"name":"Cisco Systems, Inc.,Bengaluru,India"}]},{"given":"Siva Sankara Sai","family":"Sanagapati","sequence":"additional","affiliation":[{"name":"Sri Sathya Sai Institute of Higher Learning,Department of Physics,Prasanthi Nilayam,Andhra Pradesh,India"}]},{"given":"Prayas Chandra","family":"Pradhan","sequence":"additional","affiliation":[{"name":"Sri Sathya Sai Institute of Higher Learning,Department of Physics,Prasanthi Nilayam,Andhra Pradesh,India"}]},{"given":"Sai Kiran Kumar Reddy","family":"Y","sequence":"additional","affiliation":[{"name":"Sri Sathya Sai Institute of Higher Learning,Department of Physics,Prasanthi Nilayam,Andhra Pradesh,India"}]}],"member":"263","reference":[{"journal-title":"Integrity Measurement Architecture","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9"},{"journal-title":"FIPS accredition to TPM structures and guidelines","year":"0","key":"ref12"},{"journal-title":"Introduction to the TPM Smart Cards Tokens Security and Applications","first-page":"155172","year":"2008","key":"ref13"},{"journal-title":"Types of TPM keys and their uses","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2010","author":"stallings","key":"ref16"},{"journal-title":"Hacking Sony's private key","year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"journal-title":"NIST approved key lengths","year":"0","key":"ref19"},{"year":"0","key":"ref4"},{"journal-title":"Cisco access control security AAA administrative services&#x201D;","year":"2004","author":"carroll","key":"ref3"},{"journal-title":"Global IoT revenue to reach $3 trillion in 2025","year":"0","key":"ref6"},{"journal-title":"IBM webpage on IoT","year":"0","key":"ref5"},{"journal-title":"Security in the IoT regime","year":"0","key":"ref8"},{"journal-title":"GSMA whitepapers on IoT","year":"0","key":"ref7"},{"journal-title":"The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice","year":"2014","author":"andress","key":"ref2"},{"journal-title":"The Exactis Data Breach What Consumers Need to Know","year":"0","key":"ref1"},{"journal-title":"Security Implications of IoT","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2011.578"},{"year":"0","key":"ref21"},{"journal-title":"IBM TSS from sourceforge","year":"0","key":"ref24"},{"journal-title":"IBM TPM simulator from sourceforge","year":"0","key":"ref23"}],"event":{"name":"2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2019,12,16]]},"location":"Goa, India","end":{"date-parts":[[2019,12,19]]}},"container-title":["2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9110269\/9117907\/09117946.pdf?arnumber=9117946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:49:56Z","timestamp":1755910196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9117946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ants47819.2019.9117946","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}