{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:57:23Z","timestamp":1764997043263},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/comsnets.2015.7098708","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T14:41:46Z","timestamp":1430836906000},"source":"Crossref","is-referenced-by-count":19,"title":["BlinkToSCoAP: An end-to-end security framework for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Giulio","family":"Peretti","sequence":"first","affiliation":[]},{"given":"Vishwas","family":"Lakkundi","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"bormann","year":"2012","journal-title":"Using CoAP with IPsec Tech rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364813"},{"key":"ref12","author":"montenegro","year":"2007","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks RFC 4944"},{"key":"ref13","year":"0","journal-title":"Zolertia Z1 WSN Module Datasheet 2010"},{"key":"ref14","author":"peretti","year":"2013","journal-title":"CoAP over DTLS TinyOS Implementation and Performance Analysis"},{"key":"ref4","author":"bormann","year":"2014","journal-title":"Terminology for Constrained-Node Networks IETF RFC 7228"},{"key":"ref3","author":"rescorla","year":"2012","journal-title":"Datagram Transport Layer Security Version 1 2 IETF RFC 6347"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423615"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.23"},{"key":"ref2","author":"dierks","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2 IETF RFC 5246"},{"key":"ref1","author":"shelby","year":"2014","journal-title":"The Constrained Application Protocol (CoAP) IETF RFC 7252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"}],"event":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2015,1,6]]},"end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 7th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7090755\/7098633\/07098708.pdf?arnumber=7098708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:49:00Z","timestamp":1490381340000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7098708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2015.7098708","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}