{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:41:51Z","timestamp":1725442911883},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/iecon.2013.6700065","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:14:59Z","timestamp":1389010499000},"page":"5680-5685","source":"Crossref","is-referenced-by-count":0,"title":["sQoS: The design and prototyping of secure QoS for process automation system"],"prefix":"10.1109","author":[{"given":"Hiroshi","family":"Miyata","sequence":"first","affiliation":[]},{"given":"Mitaro","family":"Namiki","sequence":"additional","affiliation":[]},{"given":"Mikiko","family":"Sato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4868"},{"key":"17","article-title":"Finding collisions in the full sha-1","author":"xiaoyun","year":"2005","journal-title":"Advances in Cryptology-CRYPTO 2005"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"key":"15","article-title":"HMAC: Keyed-hashing for message authentication","author":"krawczyk","year":"1997","journal-title":"RFC 2104"},{"key":"16","article-title":"Internet protocol, version 6 (ipv6) specification","author":"deering","year":"1998","journal-title":"RFC 2460"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6294"},{"key":"14","article-title":"TinySec: Link layer security for tiny devices","author":"karlof","year":"0","journal-title":"Proc 2nd Int Conf Embedded Networked Sensor Syst SenSys'04"},{"key":"11","first-page":"1","article-title":"Transport layer security (TLS) extensions","author":"simon","year":"2003","journal-title":"RFC3546"},{"journal-title":"Redesigning Internet-The Packet Level Authentication Architecture","year":"2008","author":"lagutin","key":"12"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2000.878263"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4302"},{"journal-title":"Security architecture for the Internet protocol","year":"0","author":"kent","key":"6"},{"key":"5","article-title":"A survey of scada and critical infrastructure incidents","author":"bill","year":"2012","journal-title":"SIGITE '11"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2474"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"}],"event":{"name":"IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society","start":{"date-parts":[[2013,11,10]]},"location":"Vienna, Austria","end":{"date-parts":[[2013,11,13]]}},"container-title":["IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6683943\/6699103\/06700065.pdf?arnumber=6700065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:56:06Z","timestamp":1490212566000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6700065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iecon.2013.6700065","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}