{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:42:55Z","timestamp":1725799375081},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icsenst.2017.8304476","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T18:51:50Z","timestamp":1520016710000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["On the design of security mechanisms for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Shantanu","family":"Pal","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hitchens","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(10)60159-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2012.6482117"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref14","article-title":"A Comprehensive Study of Security of Internet-of-Things","author":"mohsen","year":"2016","journal-title":"IEEE Trans Emerg Topics in Comp"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2015.7184819"},{"key":"ref18","article-title":"Access Control in Internet of Things: A Survey","author":"zhang","year":"2016","journal-title":"arxivCopy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref2","article-title":"That &#x2018;Internet of Things&#x2019; Thing","author":"ashton","year":"2009","journal-title":"RFID"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-016-0139-3"},{"key":"ref9","article-title":"Towards a Practical Architecture for the Next Generation Internet of Things","author":"misra","year":"2016","journal-title":"arxivCopy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"journal-title":"Firebase","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2014.915316"}],"event":{"name":"2017 Eleventh International Conference on Sensing Technology (ICST)","start":{"date-parts":[[2017,12,4]]},"location":"Sydney, NSW","end":{"date-parts":[[2017,12,6]]}},"container-title":["2017 Eleventh International Conference on Sensing Technology (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8301141\/8304414\/08304476.pdf?arnumber=8304476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T17:40:24Z","timestamp":1523468424000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icsenst.2017.8304476","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}