{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:16:30Z","timestamp":1767183390332,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,8]]},"DOI":"10.1109\/ccnc51644.2023.10059854","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T17:17:55Z","timestamp":1679073475000},"page":"1123-1128","source":"Crossref","is-referenced-by-count":7,"title":["Lightweight, Dynamic and Energy Efficient Security Mechanism for constrained IoT devices using CoAP"],"prefix":"10.1109","author":[{"given":"Mattia Giovanni","family":"Spina","sequence":"first","affiliation":[{"name":"University of Calabria,DIMES Dept.,Rende,ITALY"}]},{"given":"Floriano","family":"De Rango","sequence":"additional","affiliation":[{"name":"University of Calabria,DIMES Dept.,Rende,ITALY"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080650"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/fi12030055"},{"volume-title":"The Constrained Application Protocol (CoAP)","key":"ref4"},{"volume-title":"Datagram Transport Layer Security Version 1.2 - rfc6347","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288362"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939199"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DINWC.2018.8357000"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766412"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/WCN\/2006\/47453"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101105"},{"volume-title":"Performance Evaluation of Cryptographic Ciphers on IoT Devices","year":"2018","author":"Praneet","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s19194312"},{"volume-title":"MoPi 2: Hot-Swap Mobile Power for the Pi","key":"ref15"}],"event":{"name":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2023,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,1,11]]}},"container-title":["2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10059462\/10059600\/10059854.pdf?arnumber=10059854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:36:54Z","timestamp":1709429814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10059854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccnc51644.2023.10059854","relation":{},"subject":[],"published":{"date-parts":[[2023,1,8]]}}}