{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T05:06:02Z","timestamp":1754111162543},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/ccoms.2019.8821761","type":"proceedings-article","created":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:45:06Z","timestamp":1567460706000},"page":"687-692","source":"Crossref","is-referenced-by-count":8,"title":["An OpenID Based Authentication Service Mechanisms for Internet of Things"],"prefix":"10.1109","author":[{"given":"Ahammad","family":"Karim","sequence":"first","affiliation":[]},{"given":"Muhammad Abdullah","family":"Adnan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361406"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417597"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354740"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.8"},{"key":"ref16","article-title":"Identity Management in E-Health: A Case Study of Web of Things application using OpenID Connect","author":"domenech","year":"2014","journal-title":"12th IEEE International Conference on E-Health Networking Applications and Services (Healthcom)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2988272.2988274"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob.2016.7811451"},{"journal-title":"Cisco Enterprises Are Leading The Internet of Things Innovation","year":"2017","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref6","article-title":"Identifying an OpenID anti-phishing scheme for cyberspace","author":"abbas","year":"2014","journal-title":"Security and Communication Networks"},{"journal-title":"https \/\/www openid net","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.85"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7146004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref1","first-page":"146","author":"sicari","year":"2014","journal-title":"Security privacy and trust in Internet of Things The road ahead"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"year":"0","key":"ref20"},{"key":"ref22","article-title":"Connecting the Web with the Web of Things:Lessons Learned From Implementing a CoAP&#x2013;HTTP Proxy","author":"lerche","year":"2012","journal-title":"IEEE International Conference on Mobile Ad-hoc and Sensor Systems"},{"key":"ref21","article-title":"CoAP for the Web of Things:From Tiny Resource-constrained Devices to the Web Browser","author":"kovatsch","year":"2013","journal-title":"WoT 2013 Fourth International Workshop on the Web of Things"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/561487"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264878"}],"event":{"name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2019,2,23]]},"location":"Singapore","end":{"date-parts":[[2019,2,25]]}},"container-title":["2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811523\/8821628\/08821761.pdf?arnumber=8821761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:16:25Z","timestamp":1657840585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8821761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccoms.2019.8821761","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}