{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:33:42Z","timestamp":1762918422723,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T00:00:00Z","timestamp":1710115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T00:00:00Z","timestamp":1710115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,11]]},"DOI":"10.1109\/percomworkshops59983.2024.10503079","type":"proceedings-article","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T18:10:48Z","timestamp":1713895848000},"page":"82-87","source":"Crossref","is-referenced-by-count":2,"title":["Undeniable Authentication of Digital Twin-managed Smart Microfactory"],"prefix":"10.1109","author":[{"given":"Anusha","family":"Vangala","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology,Department of Computer Science,Rolla,USA"}]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology,Centre for Security, Theory and Algorithmic Research,Hyderabad,India"}]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology,Department of Computer Science,Rolla,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2019.1599439"},{"article-title":"Whitepaper on Digital Twin: Manufacturing Excellence through Virtual Factory Replication","year":"2014","author":"Grieves","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3171465"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref7","article-title":"Modelling and Automatically Analysing Privacy Properties for Honest-but-Curious Adversaries","volume-title":"Tech. Report","author":"Paverd","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4751"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0848-6_42"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625518"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3249116"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8792990"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46877-3_41"},{"key":"ref15","first-page":"10","article-title":"The X3DH Key Agreement Protocol","volume":"283","author":"Marlinspike","year":"2016","journal-title":"Open Whisper Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2004.01.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref18","first-page":"863","article-title":"Encryption and ISDN-A natural fit","volume-title":"Proceedings of the 1987 International Switching Symposium","author":"O\u2019Higgins"},{"year":"2021","key":"ref19","article-title":"Automated Validation of Internet Security Protocols and Applications"},{"journal-title":"FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce","article-title":"Advanced Encryption Standard","year":"2001","key":"ref20"}],"event":{"name":"2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","start":{"date-parts":[[2024,3,11]]},"location":"Biarritz, France","end":{"date-parts":[[2024,3,15]]}},"container-title":["2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10502396\/10502378\/10503079.pdf?arnumber=10503079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T05:10:21Z","timestamp":1713935421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10503079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/percomworkshops59983.2024.10503079","relation":{},"subject":[],"published":{"date-parts":[[2024,3,11]]}}}