{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:27:05Z","timestamp":1725755225876},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,7]]},"DOI":"10.1109\/ictas59620.2024.10507126","type":"proceedings-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T17:39:17Z","timestamp":1714066757000},"page":"128-132","source":"Crossref","is-referenced-by-count":0,"title":["An Extension to the Lightweight Blockchain Scheme for Some Cases of Internet of Things Systems : A protocol for secure transferring IoT sensors between edge nodes"],"prefix":"10.1109","author":[{"given":"Sergey","family":"Panasenko","sequence":"first","affiliation":[{"name":"JSC \"Active Soft\",Moscow,Russian Federation"}]}],"member":"263","reference":[{"article-title":"China Academy of Information and Communication Technology","volume-title":"Trusted Blockchain Initiatives","year":"2018","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849014"},{"key":"ref3","article-title":"Virtual Applications and Implementations Research Lab eBACS Project: ECRYPT Benchmarking of Cryptographic Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224222"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5113-0_68"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3060373"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013282"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802723"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.050"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100529"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5510586"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC58020.2023.10182980"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CICN59264.2023.10402182"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8446"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8422","article-title":"RFC 8422","author":"Nir","year":"2018","journal-title":"Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_41"}],"event":{"name":"2024 Conference on Information Communications Technology and Society (ICTAS)","start":{"date-parts":[[2024,3,7]]},"location":"Durban, South Africa","end":{"date-parts":[[2024,3,8]]}},"container-title":["2024 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10507104\/10507105\/10507126.pdf?arnumber=10507126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:26:05Z","timestamp":1714760765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10507126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ictas59620.2024.10507126","relation":{},"subject":[],"published":{"date-parts":[[2024,3,7]]}}}