{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:07Z","timestamp":1761401767004,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7248379","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:40:36Z","timestamp":1441946436000},"page":"549-554","source":"Crossref","is-referenced-by-count":71,"title":["Security as a CoAP resource: An optimized DTLS implementation for the IoT"],"prefix":"10.1109","author":[{"given":"Angelo","family":"Capossele","sequence":"first","affiliation":[]},{"given":"Valerio","family":"Cervo","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"De Cicco","sequence":"additional","affiliation":[]},{"given":"Chiara","family":"Petrioli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"year":"0","key":"ref30","article-title":"SEC 2: Recommended Elliptic Curve Domain Parameters version 2.0"},{"key":"ref10","first-page":"32","article-title":"Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks","author":"fouladgar","year":"2007","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks in LNCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1860079.1860090"},{"key":"ref12","article-title":"The Transport Layer Security (TLS) Protocol, Version 1.2","volume":"5246","author":"dierks","year":"2008","journal-title":"IETF RFC"},{"key":"ref13","article-title":"Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)","volume":"4492","author":"blake-wilson","year":"2006","journal-title":"IETF RFC"},{"key":"ref14","article-title":"The Constrained Application Protocol (CoAP)","author":"shelby","year":"2014","journal-title":"IETF RFC 7252"},{"key":"ref15","article-title":"Datagram Transport Layer Security","volume":"4347","author":"rescotla","year":"2006","journal-title":"IETF RFC"},{"key":"ref16","article-title":"Practical Issues with Datagram Transport Layer Security in Constrained Environments draft - hartke-dice-practical-issues-Ol","author":"hartke","year":"2014","journal-title":"Internet draft"},{"key":"ref17","article-title":"Profiling of DTLS for CoAP-based IoT Applications draft - keoh-dice-dtls-profile-iot-00","author":"keoh","year":"2013","journal-title":"Internet-draft"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"article-title":"Guide to Elliptic Curve Cryptography. Secaucus","year":"2003","author":"hankerson","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517410"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37935-2_18"},{"key":"ref6","article-title":"Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?","author":"ateniese","year":"2013","journal-title":"Proceedings of the 20th Annual Network & Distributed System Security Symposium NDSS'13"},{"key":"ref29","first-page":"119","article-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.008"},{"journal-title":"IEEE Approved Std P802 15 4a\/D7 Jan 2007","article-title":"Approved Draft Amendment to IEEE Standard for Information technology-Telecommunications and information exchange between systems-PART 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs): Amendment to add alternate PHY (Amendment of IEEE Std 802.15.4)","year":"2007","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"ref1","article-title":"IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals","author":"kushalnagar","year":"2007","journal-title":"Network Working Group RFC 4919"},{"article-title":"A Security Architecture for Wireless Sensor Networks based on DTLS","year":"2011","author":"kothmayr","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514185"},{"key":"ref23","first-page":"1","article-title":"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication","author":"granjal","year":"2013","journal-title":"2013 IFIP Networking Conference IFIP Networking"},{"key":"ref26","article-title":"Photuris: Session-Key Management Protocol","author":"karn","year":"1999","journal-title":"RFC 2522 IETF Network Working Group"},{"key":"ref25","article-title":"197: Announcing the Advanced Encryption Standard (AES)","volume":"5","author":"fips","year":"2001","journal-title":"National Institute of Standards and Technology Information Technology Laboratory"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07248379.pdf?arnumber=7248379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T20:55:18Z","timestamp":1496696118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7248379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7248379","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}