{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:01:29Z","timestamp":1729627289328,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ictc.2017.8190803","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:02:05Z","timestamp":1513288925000},"page":"873-878","source":"Crossref","is-referenced-by-count":14,"title":["Data management and searching system and method to provide increased security for IoT platform"],"prefix":"10.1109","author":[{"given":"Moon Yong","family":"Jung","sequence":"first","affiliation":[]},{"given":"Ju Wook","family":"Jang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"IP spoofing: an introduction","volume":"11","author":"matthew","year":"2003","journal-title":"Security Focus"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"},{"key":"ref10","first-page":"120","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21 2","author":"ronald","year":"1978","journal-title":"Communications of the ACM"},{"journal-title":"Single Point of Failure The Ten Essential Laws of Supply Chain Risk Management","year":"2009","author":"gary","key":"ref6"},{"key":"ref11","first-page":"36","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1 1","author":"don","year":"2001","journal-title":"International Journal of Information Security"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"key":"ref12","article-title":"Attacks on cryptographic hashes in Internet protocols","author":"paul","year":"2005","journal-title":"No RFC 4270"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref7","first-page":"35","article-title":"Cassandra: a decentralized structured storage system","volume":"44 2","author":"avinash","year":"2010","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref2","first-page":"401","article-title":"On Recent Security Enhancements to Autoconfiguration Protocols for MANETs: Real Threats and Requirements","volume":"9 4","author":"abdelmalek","year":"2009","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref9","volume":"28","author":"satoshi","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"journal-title":"IDC The Digital Age of Opportunities The seventh digital universe study","year":"2014","key":"ref1"}],"event":{"name":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2017,10,18]]},"location":"Jeju","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125636\/8190740\/08190803.pdf?arnumber=8190803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:31:17Z","timestamp":1643153477000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8190803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ictc.2017.8190803","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}