{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:40:23Z","timestamp":1730288423282,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percomw.2018.8480384","type":"proceedings-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T19:49:51Z","timestamp":1539028191000},"page":"468-471","source":"Crossref","is-referenced-by-count":5,"title":["Trustworthy Sensing in an Untrusted IoT Environment"],"prefix":"10.1109","author":[{"given":"Mamadou H.","family":"Diallo","sequence":"first","affiliation":[]},{"given":"Nisha","family":"Panwar","sequence":"additional","affiliation":[]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[]},{"given":"Ardalan Amiri","family":"Sani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ieee p2413 iot standard","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"journal-title":"Policy management and interoperation through negotiation in ubiquitous computing","year":"2008","author":"ramakrishna","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_11"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.5120\/19547-1280","article-title":"A critical analysis on the security concerns of internet of things (iot)","volume":"111","author":"farooq","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref9","article-title":"Tippers: A privacy cognizant iot environment","author":"mehrotra","year":"2016","journal-title":"Pervasive Computing and Communications Workshop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_2"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8454955\/8480085\/08480384.pdf?arnumber=8480384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T06:35:09Z","timestamp":1540881309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/percomw.2018.8480384","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}