{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T23:53:56Z","timestamp":1730246036617,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/iciinfs.2016.8262986","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:33:43Z","timestamp":1516660423000},"page":"469-473","source":"Crossref","is-referenced-by-count":3,"title":["Design of a novel lightweight key establishment mechanism for smart home systems"],"prefix":"10.1109","author":[{"given":"Qaidjohar","family":"Jawadwala","sequence":"first","affiliation":[]},{"given":"Kailas","family":"Patil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0541-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2012.6221884"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2012.57"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2475298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref17","article-title":"Security in smart home environment","author":"georgios","year":"2006","journal-title":"Wireless Technologies for Ambient Assisted Living and Healthcare Systems and Applications IGI global"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.87"},{"key":"ref19","first-page":"383","article-title":"A measurement study of the content security policy on real-world applications","volume":"18","author":"patil","year":"2016","journal-title":"International Journal of Network Security"},{"journal-title":"Smart Thermostat Security Turning up the Heat","year":"0","author":"burrough","key":"ref4"},{"key":"ref3","first-page":"1","author":"ayday","year":"2013","journal-title":"Secure device authentication mechanisms for the smart grid-enabled home area networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133628"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024418"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2014.07.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2013.35"},{"journal-title":"Smart Homes for All","year":"0","key":"ref2"},{"journal-title":"Hope-smart home for elderly people","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5473869"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6574"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"ref21","article-title":"Architectural considerations in smart object networking","author":"tschofenig","year":"2014","journal-title":"Internet Engineering Task Force Draft"}],"event":{"name":"2016 11th International Conference on Industrial and Information Systems (ICIIS)","start":{"date-parts":[[2016,12,3]]},"location":"Roorkee","end":{"date-parts":[[2016,12,4]]}},"container-title":["2016 11th International Conference on Industrial and Information Systems (ICIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253767\/8262887\/08262986.pdf?arnumber=8262986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T23:48:50Z","timestamp":1519084130000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8262986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iciinfs.2016.8262986","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}