{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:33:04Z","timestamp":1770222784324,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iscc.2016.7543884","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T20:35:08Z","timestamp":1471552508000},"page":"1109-1111","source":"Crossref","is-referenced-by-count":90,"title":["Identity-based authentication scheme for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Ola","family":"Salman","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Abdallah","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref13","author":"coughlin","year":"0","journal-title":"SDN Security A survey"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.014"},{"key":"ref15","article-title":"'Towards a definition of the Internet of Things (IoT)","author":"minerva","year":"2015","journal-title":"The Internet-II initiative"},{"key":"ref4","first-page":"77","article-title":"Method for secure RESTful web service","author":"sungchul","year":"2015","journal-title":"IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS 2015)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2818362.2818363"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref2","author":"william","year":"2011","journal-title":"'Cryptography and Network Security Fifth Edition"},{"key":"ref1","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225303"}],"event":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","location":"Messina, Italy","start":{"date-parts":[[2016,6,27]]},"end":{"date-parts":[[2016,6,30]]}},"container-title":["2016 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536670\/7543699\/07543884.pdf?arnumber=7543884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T00:45:21Z","timestamp":1475196321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7543884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscc.2016.7543884","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}