{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:01Z","timestamp":1767340021919},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710190","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"254-257","source":"Crossref","is-referenced-by-count":1,"title":["Pre-Shared Key Authentication in Ephemeral Diffie-Hellman Over COSE"],"prefix":"10.1109","author":[{"given":"Elsa Lopez","family":"Perez","sequence":"first","affiliation":[{"name":"Inria,Paris,France"}]},{"given":"Thomas","family":"Watteyne","sequence":"additional","affiliation":[{"name":"Inria,Paris,France"}]},{"given":"Mali\u0161a","family":"Vu\u010dini\u0107","sequence":"additional","affiliation":[{"name":"Inria,Paris,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570830"},{"article-title":"A Comprehensive, Formal and Automated Analysis of the EDHOC Protocol","volume-title":"USENIX Security Symposium (USENIX)","author":"Jacomme","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30122-3_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0010554000002998"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7314508"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2024.3415908"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710190.pdf?arnumber=10710190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:56:21Z","timestamp":1728968181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710190","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}