{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:50:44Z","timestamp":1762660244078,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011950","name":"ITEA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850290","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"253-260","source":"Crossref","is-referenced-by-count":2,"title":["BLEND: Efficient and blended IoT data storage and communication with application layer security"],"prefix":"10.1109","author":[{"given":"Joel","family":"Hoglund","sequence":"first","affiliation":[{"name":"RISE Research Institutes of Sweden,Kista,Stockholm,16440"}]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden,Kista,Stockholm,16440"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.378"},{"year":"2020","key":"ref14","article-title":"Android keystore system"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1260"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2019.00024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8152"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"ref4","article-title":"Comparison of coap security protocols","author":"mattsson","year":"2020","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-ietflwig-security-protocol-comparison-05"},{"key":"ref3","article-title":"Ephemeral diffie-hellman over cose (edhoc)","author":"selander","year":"2021","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-ietf-lake-edhoc-03"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7400"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6282"},{"key":"ref8","first-page":"101658","article-title":"Pki4iot: Towards public key infrastructure for the internet of things","author":"hoglund","year":"2019","journal-title":"Computers & Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323408"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8613"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847632"},{"key":"ref20","article-title":"Group oscore - secure group communication for coap","author":"tiloca","year":"2022","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-ietf-core-oscore-groupcomm-14"},{"year":"2020","key":"ref22","article-title":"Zephyr project"},{"key":"ref21","first-page":"73","article-title":"A comparative study on operating system for wireless sensor networks","author":"vu chien","year":"2011","journal-title":"2011 International Conference on Advanced Computer Science and Information Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8937"},{"journal-title":"Zolertia Firefly platform","year":"2018","key":"ref23"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2022,7,27]]},"location":"Rhodes, Greece","end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850290.pdf?arnumber=9850290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:23:10Z","timestamp":1662409390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850290","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}