{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:18:44Z","timestamp":1758125924532},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/iecon.2014.7049308","type":"proceedings-article","created":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T01:04:43Z","timestamp":1432343083000},"page":"5293-5299","source":"Crossref","is-referenced-by-count":46,"title":["An authentication and access control framework for CoAP-based Internet of Things"],"prefix":"10.1109","author":[{"given":"Pablo Punal","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Jens","family":"Eliasson","sequence":"additional","affiliation":[]},{"given":"Jerker","family":"Delsing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Artemis strategic reseach agenda","author":"gide","year":"2011","journal-title":"Artemisis"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5785","article-title":"defining well-known uniform resource identifiers (uris)","author":"nottingham","year":"2010"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5280","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"cooper","year":"2008"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1321","article-title":"The MD5 Message-Digest Algorithm","author":"rivest","year":"1992"},{"year":"2006","author":"eastlake","article-title":"The MD5 Message-Digest Algorithm","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6070","article-title":"PKCS 5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors","author":"josefsson","year":"2011"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6733","article-title":"Diameter Base Protocol","author":"fajardo","year":"2012"},{"key":"ref18","article-title":"Secure Communication for the Internet of Things-A Comparison of Link-Layer Security and IPsec for 6LoWPAN","author":"raza","year":"2012","journal-title":"Security and Communication Networks"},{"year":"2014","author":"bergmann","journal-title":"libcoap 4 1 1 C-implementation of coap","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6071","article-title":"IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap","author":"frankel","year":"2011"},{"key":"ref6","article-title":"Constrained application protocol (coap) draft-ietf-core-coap-18","author":"shelby","year":"2013","journal-title":"Tech Rep"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4347","article-title":"Datagram Transport Layer Security","author":"rescorla","year":"2006"},{"year":"1995","author":"rekhter","article-title":"Remote Authentication Dial In User Service (RADIUS)","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4121","article-title":"The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2","author":"zhu","year":"2005"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/INDIN.2010.5549676"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/IECON.2011.6119279"},{"year":"2008","article-title":"Monitoring and control: Today's market and its evolution till 2020","key":"ref9"},{"year":"2013","author":"kovatsch","journal-title":"Copper (cu) v0 18 2 firefox add-on","key":"ref20"}],"event":{"name":"IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society","start":{"date-parts":[[2014,10,29]]},"location":"Dallas, TX, USA","end":{"date-parts":[[2014,11,1]]}},"container-title":["IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7036020\/7048466\/07049308.pdf?arnumber=7049308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T12:58:39Z","timestamp":1566737919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7049308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iecon.2014.7049308","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}