{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:41:23Z","timestamp":1730252483198,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/icnp59255.2023.10355621","type":"proceedings-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T19:18:50Z","timestamp":1703099930000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Network-Based IoT Device Authentication in Cloud Services"],"prefix":"10.1109","author":[{"given":"Tom\u00e1s","family":"Silva","sequence":"first","affiliation":[{"name":"TP Portugal Operations SA,Lisbon,Portugal"}]},{"given":"Jo\u00e3o","family":"Casal","sequence":"additional","affiliation":[{"name":"TP Portugal Operations SA,Lisbon,Portugal"}]},{"given":"Ricardo","family":"Chaves","sequence":"additional","affiliation":[{"name":"INESC-ID, IST, ULisboa,Lisbon,Portugal"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Number of mobile devices worldwide 2020\u20132025","author":"Laricchia","year":"2023","journal-title":"Statista website"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20936-9_28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s19051141"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137175"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE53296.2022.9730410"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102312"},{"journal-title":"Efficient security algorithm for provisioning constrained internet of things (iot) devices","year":"2023","author":"Mamvong","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s20020501"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5281-1_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"ref12","article-title":"Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-ace-oauth-authz-42","author":"Seitz","year":"2021"},{"article-title":"The oauth 2.0 authorization framework","volume-title":"Internet Standard","year":"2012","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8392","article-title":"Cbor web token (cwt)","volume-title":"Internet Requests for Comments, RFC Editor, RFC 8392","author":"Jones","year":"2018"},{"key":"ref16","article-title":"Concise binary object representation (cbor)","volume-title":"Internet Requests for Comments, RFC Editor, RFC 8949","author":"Hoffman","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917610"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2850"},{"article-title":"Security features of lte-m and nbiot networks","volume-title":"GSMA","year":"2019","key":"ref19"},{"key":"ref20","first-page":"1","article-title":"Security in the gsm network","volume":"2012","author":"Korkusuz","year":"2012","journal-title":"Term project"},{"key":"ref21","article-title":"Authentication of devices to third party services","volume-title":"PCT\/GB2021\/051 093","author":"Morgado","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961993"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3077318"}],"event":{"name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2023,10,10]]},"location":"Reykjavik, Iceland","end":{"date-parts":[[2023,10,13]]}},"container-title":["2023 IEEE 31st International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10355566\/10355569\/10355621.pdf?arnumber=10355621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T22:52:59Z","timestamp":1705099979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10355621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icnp59255.2023.10355621","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}