{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:13:55Z","timestamp":1759335235096,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346889","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"690-694","source":"Crossref","is-referenced-by-count":14,"title":["Pulga, a tiny open-source MQTT broker for flexible and secure IoT deployments"],"prefix":"10.1109","author":[{"given":"Jose Luis","family":"Espinosa-Aranda","sequence":"first","affiliation":[]},{"given":"Noelia","family":"Vallez","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Sanchez-Bueno","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Aguado-Araujo","sequence":"additional","affiliation":[]},{"given":"Gloria","family":"Bueno","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Deniz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Making sense of interoperability: Protocols and Standardization initiatives in lOT","author":"sutaria","year":"2013","journal-title":"2nd International Workshop on Computing and Networking for Internet of Things"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14886-1_10"},{"year":"0","key":"ref6"},{"article-title":"Power Profiling: HTTPS Long Polling vs. MQTT with SSL, on Android (2012)","year":"2012","author":"nicholas","key":"ref5"},{"year":"0","key":"ref8"},{"key":"ref7","first-page":"540","article-title":"Managing Ad Hoc Networks of Smartphones","volume":"3","author":"zhuang","year":"2013","journal-title":"International Journal of Information and Education Technology"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346889.pdf?arnumber=7346889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:53:33Z","timestamp":1490403213000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346889","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}