{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T15:48:24Z","timestamp":1760888904862,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/fgct.2013.6767217","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:25:36Z","timestamp":1395343536000},"page":"163-168","source":"Crossref","is-referenced-by-count":46,"title":["Security analysis of the constrained application protocol in the Internet of Things"],"prefix":"10.1109","author":[{"given":"Thamer A.","family":"Alghamdi","sequence":"first","affiliation":[]},{"given":"Aboubaker","family":"Lasebae","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Aiash","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Security for practical coap applications: Issues and solution approaches","author":"brachmann","year":"2011","journal-title":"GI\/ITG KuVS Fachgesprch Sensornetze (FGSN"},{"key":"16","article-title":"Datagram transport layer security in constrained environments","author":"hartke","year":"0","journal-title":"Internet-Draft (Work in Progress drafthartke-core-codtls-02"},{"journal-title":"Itu-t Recommendation X 805 and its Application to Ngn","year":"0","author":"zeltsan","key":"13"},{"journal-title":"Security Framework Making the Case for End-To-End Wi-Fi Security","article-title":"The bell labS","year":"0","key":"14"},{"key":"11","first-page":"287","author":"raza","year":"2012","journal-title":"6Lo WPAN Compressed DTLS for CoAP"},{"key":"12","article-title":"6lo wpan extension for ipsec","author":"raza","year":"0","journal-title":"Interconnecting Smart Objects with the Internet Workshop"},{"journal-title":"Simple Object Access Protocol (SOAP)","year":"0","author":"gudgin","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675778"},{"journal-title":"Web Services Architecture","year":"2004","author":"booth","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"7","article-title":"Constrained application protocol (coap","author":"shelby","year":"0","journal-title":"Internet-Draft (Work in Progress draft-ietf-corecoap-018"},{"journal-title":"Routing over low power and lossy networks","year":"0","key":"6"},{"journal-title":"IPv6 over Low-Power Wireless Personal Area Networks","year":"2007","author":"kushalnagar","key":"5"},{"journal-title":"Extensible Markup Language (XML","year":"0","key":"4"},{"key":"9","article-title":"Using coap with ipsec","volume":"6","author":"bormann","year":"2012","journal-title":"Internet-Draft (Work in Progress draft-bormann-core-ipsec-for-coap-00"},{"journal-title":"Constrained RESTful Environments (Core)","year":"0","key":"8"}],"event":{"name":"2013 Second International Conference on Future Generation Communication Technology (FGCT)","start":{"date-parts":[[2013,11,12]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,11,14]]}},"container-title":["Second International Conference on Future Generation Communication Technologies (FGCT 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6766332\/6767177\/06767217.pdf?arnumber=6767217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:37:44Z","timestamp":1490301464000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/fgct.2013.6767217","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}