{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:38Z","timestamp":1759072118448,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ictc.2014.6983078","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:52:42Z","timestamp":1419983562000},"page":"28-33","source":"Crossref","is-referenced-by-count":23,"title":["Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake"],"prefix":"10.1109","author":[{"given":"Jiye","family":"Park","sequence":"first","affiliation":[]},{"given":"Namhi","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Practical Issues with Datagram Transport Layer Security in Constrained Environments","year":"0","author":"hartke","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"journal-title":"Secure Initial-key Reconfiguration for Resource Constrained Devices","year":"0","author":"kang","key":"13"},{"journal-title":"CoRE Resource Directory","year":"0","author":"shelby","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"journal-title":"Delegated CoAP Authentication and Authorization Framework (DCAF)","year":"0","author":"gerdes","key":"12"},{"key":"3","article-title":"Terminology for constrained- node networks","volume":"7228","author":"bormann","year":"0","journal-title":"RFC"},{"journal-title":"Embracing the Internet of Everything to Capture Your Share of 14 4 Trillion","year":"2013","author":"bradly","key":"2"},{"journal-title":"The Internet of Things in the Clound","year":"2013","author":"zhou","key":"1"},{"journal-title":"Compression of Record and Handshake Headers for Constrained Environments","year":"0","author":"raza","key":"10"},{"key":"7","article-title":"LITH: Lightweight secure CoAP for the internet of things","volume":"13","author":"raza","year":"2012","journal-title":"IEEE Sensors Journal"},{"journal-title":"A DTLS 1 2 Profile for the Internet of Things","year":"0","author":"hartke","key":"6"},{"key":"5","article-title":"The constrained application protocol (CoAP)","volume":"7252","author":"shelby","year":"0","journal-title":"RFC"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"9","article-title":"Simple keys for simple smart objects","author":"bergamann","year":"2012","journal-title":"Workshop on Smart Object Security"},{"journal-title":"Practical Issues with Datagram Transport Layer Security in Constrained Environments","year":"2014","author":"hartke","key":"8"}],"event":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2014,10,22]]},"location":"Busan, South Korea","end":{"date-parts":[[2014,10,24]]}},"container-title":["2014 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6966882\/6983064\/06983078.pdf?arnumber=6983078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T04:30:12Z","timestamp":1490329812000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6983078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictc.2014.6983078","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}