{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:22:05Z","timestamp":1730211725636,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679493","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"235-240","source":"Crossref","is-referenced-by-count":0,"title":["Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security"],"prefix":"10.1109","author":[{"given":"D.","family":"Shur","sequence":"first","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"G.","family":"Di Crescenzo","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"T.","family":"Chen","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"Z.","family":"Patni","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"Y-J.","family":"Lin","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"S.","family":"Alexander","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"B.","family":"Flin","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]},{"given":"R.","family":"Levonas","sequence":"additional","affiliation":[{"name":"Peraton Labs,Basking Ridge,NJ,07920"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771654"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jiixd.2023.12.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-172"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154454"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3008879"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539701398521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref13","first-page":"156","article-title":"Attribute-based encryption","volume":"2","author":"Sahai","year":"2009","journal-title":"Identity-Based Cryptography, ser. Cryptology and Information Security Series. IOS Press"},{"key":"ref14","first-page":"1519","article-title":"JEDI: Many-to-Many End-to-End encryption and key delegation for IoT","volume-title":"28th USENIX Security Symposium","author":"Kumar"},{"journal-title":"manuscript, 2024","article-title":"Efficient multicast stream authentication from iot devices","author":"DiCrescenzo","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"journal-title":"manuscript, 2024","article-title":"Scalable and end-to-end-secure publish-subscribe from hierarchical identity-based encryption","author":"DiCrescenzo","key":"ref17"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679493.pdf?arnumber=10679493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:57:19Z","timestamp":1727240239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679493","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}