{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T10:07:37Z","timestamp":1747908457151,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/isdfs55398.2022.9800797","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T15:52:11Z","timestamp":1655913131000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["ChevroCrypto \u2013 Security &amp; Cryptography Broker"],"prefix":"10.1109","author":[{"given":"Filipe","family":"Alves","sequence":"first","affiliation":[{"name":"Polytechnic of C&#x00E1;vado and Ave,Barcelos,Portugal"}]},{"given":"Nuno","family":"Mateus-Coelho","sequence":"additional","affiliation":[{"name":"Polytechnic of C&#x00E1;vado and Ave,Barcelos,Portugal"}]},{"given":"Manuela","family":"Cruz-Cunha","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of C&#x00E1;vado and Ave, Barcelos, Portugal,Polytechnic of C&#x00E1;vado and Ave 2Ai &#x2013; School of Technology,Barcelos,Portugal"}]}],"member":"263","reference":[{"article-title":"Blockchain Technology Overview","year":"2019","author":"yaga","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.43"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2017.3421554"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MECO52532.2021.9460128"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"year":"0","key":"ref10","article-title":"Researchers show that IoT devices are not designed with security in mind | Computerworld"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.01.320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3125502.3125559"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/IJWP.2021010102"},{"article-title":"26TH Daaam International Symposium on Intelligent Manufacturing and Automation Classification of Security Risks in the Iot Environment","year":"0","author":"cviti?","key":"ref15"},{"year":"0","key":"ref16","article-title":"OWASP Internet of Things"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6707-0_20"},{"article-title":"Handbook of applied cryptography","year":"2001","author":"menezes","key":"ref18"},{"key":"ref19","first-page":"2\/1","article-title":"basic principles of cryptography","author":"piper","year":"1996","journal-title":"IEE Colloquium on Public Uses of Cryptography (Digest No 1996\/085)"},{"journal-title":"Cryptography and Network Security","year":"2004","author":"katz","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informatics"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4808979"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GCWOT49901.2020.9391613"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASET.2018.8376830"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/AISPE"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"year":"0","key":"ref7","article-title":"(No Title)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/IJWP.2020070104"},{"key":"ref1","first-page":"127","article-title":"Paranoid Operating System Methodology for Anonymous & Secure Web Browsing","volume":"17","author":"coelho","year":"2017","journal-title":"Atas da Confer&#x00EA;ncia da Assoc Port Sist Informa&#x00E7;&#x00E3;o"},{"journal-title":"Principles of Information Security","year":"2018","author":"whitman","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-47974-2","author":"delfs","year":"2015","journal-title":"Introduction to Cryptography Principles and Applications"},{"key":"ref24","volume":"3","author":"stallings","year":"2014","journal-title":"Criptografia e Seguran&#x00E7;a de Redes Princ&#x00ED;pios E Pr&#x00E1;ticas 4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1159755"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2013.6563875"}],"event":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2022,6,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,6,7]]}},"container-title":["2022 10th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9800750\/9800752\/09800797.pdf?arnumber=9800797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T13:57:51Z","timestamp":1686578271000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/isdfs55398.2022.9800797","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}