{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:39:00Z","timestamp":1740101940682,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2102303"],"award-info":[{"award-number":["2019YFB2102303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971014,11675199"],"award-info":[{"award-number":["61971014,11675199"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,21]]},"DOI":"10.1109\/icccs57501.2023.10151033","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:04:47Z","timestamp":1687802687000},"page":"689-694","source":"Crossref","is-referenced-by-count":0,"title":["Research on Distributed Internet of Things Trusted Operation Based on Dynamic Trusted Metrics"],"prefix":"10.1109","author":[{"given":"Guiping","family":"Zheng","sequence":"first","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Tianqi","family":"Peng","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Chong","family":"Guo","sequence":"additional","affiliation":[{"name":"Beijing Trusty Cloud Technology Co., Ltd.,Beijing,China"}]},{"given":"Chen","family":"Guo","sequence":"additional","affiliation":[{"name":"China Cybersecurity Review Technology and Certification Center,Beijing,China"}]},{"given":"Ximing","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Chuangan Hengyu Technology Co., Ltd.,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0657"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102467"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2374154"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108413"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3232"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.4.3.175-185"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07446-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3284316"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2020.107635"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.07.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2019.8777504"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.15.4.372-378"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781003337966-6"},{"key":"ref9","first-page":"403","article-title":"A novel framework for achievable secrecy through-put of distributed cognitive radio wireless networks","volume":"10","author":"ma","year":"2015","journal-title":"J Commun"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-01937-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3031162"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3192978"},{"key":"ref5","article-title":"Leveraging blockchain for ensuring trust in iot: A survey","author":"kumar","year":"2021","journal-title":"Journal of King Saud University-Computer and Information Sciences"}],"event":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2023,4,21]]},"location":"Guangzhou, China","end":{"date-parts":[[2023,4,23]]}},"container-title":["2023 8th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10150427\/10150444\/10151033.pdf?arnumber=10151033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:31:45Z","timestamp":1689615105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10151033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccs57501.2023.10151033","relation":{},"subject":[],"published":{"date-parts":[[2023,4,21]]}}}