{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:36:35Z","timestamp":1729618595813,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icics.2015.7459923","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T11:46:29Z","timestamp":1462448789000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["Open security and privacy challenges for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Girts","family":"Strazdins","sequence":"first","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Hype cycle for the internet of things, 2014","author":"lehong","year":"2014","journal-title":"Technical Report"},{"key":"ref11","article-title":"Connecting with the Industrial Internet of Things (IIoT)","author":"teich","year":"2013","journal-title":"Moor Insights & Strategy Tech Rep"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/TENCON.2015.7372918","article-title":"Big data and industrial internet of things for the maritime industry in northwestern norway","author":"wang","year":"2015","journal-title":"TENCON 2015 IEEE Region 10 Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8155-3_13"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/CASSET.2004.1322931","article-title":"Achieving fairness in wireless environment","volume":"1","author":"wang","year":"2004","journal-title":"Emerging Technologies Frontiers of Mobile and Wireless Communication 2004 Proceedings of the IEEE 6th Circuits and Systems Symposium on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2030509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/a6020197"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_24"},{"key":"ref4","article-title":"That &#x201C;Internet of Things&#x201D; thing","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1189"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"journal-title":"Accenture Tech Rep","article-title":"Driving Unconventional Growth through the Industrial Internet of Things","year":"2014","key":"ref6"},{"key":"ref5","article-title":"The internet of things - how the next evolution of the internet is changing everything","author":"evans","year":"2011","journal-title":"White Paper Cisco Internet Business Solutions Group"},{"journal-title":"Tech Rep","article-title":"Disruptive Civil Technologies - Six Technologies with Potential Impacts on US Interests Out to 2025 - Conference Report CR 2008&#x2013;07","year":"2008","key":"ref8"},{"key":"ref7","article-title":"Creating the internet of your things","author":"edson","year":"2015","journal-title":"Microsoft Corporation Tech Rep"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"key":"ref9","article-title":"Key trends to watch in gartner 2012 emerging technologies hype cycle","author":"lehong","year":"2012","journal-title":"Web article"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","article-title":"Eavesdropping activities in wireless networks: Impact of channel randomness","author":"li","year":"2015","journal-title":"TENCON 2015 IEEE Region 10 Conference"},{"key":"ref22","article-title":"Fully homomorphic encryption without bootstrapping","author":"brakerski","year":"2011","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180351"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"}],"event":{"name":"2015 10th International Conference on Information, Communications and Signal Processing (ICICS)","start":{"date-parts":[[2015,12,2]]},"location":"Singapore","end":{"date-parts":[[2015,12,4]]}},"container-title":["2015 10th International Conference on Information, Communications and Signal Processing (ICICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7454592\/7459813\/07459923.pdf?arnumber=7459923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T05:41:52Z","timestamp":1567834912000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7459923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icics.2015.7459923","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}