{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:12:15Z","timestamp":1767183135607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3139937.3139945","type":"proceedings-article","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T12:45:14Z","timestamp":1509540314000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Secure Event Logging System for Smart Homes"],"prefix":"10.1145","author":[{"given":"Sepideh","family":"Avizheh","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Tam Thanh","family":"Doan","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Xi","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. https:\/\/www.openssl.org\/docs\/man1.0.2\/crypto\/sha.html. (2017). Accessed on July 27 2017.  2017. https:\/\/www.openssl.org\/docs\/man1.0.2\/crypto\/sha.html. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732614"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. 2017. Smart Home Kits. https:\/\/developer.apple.com\/library\/content\/documentation. (2017). Accessed on July 27 2017.  Apple. 2017. Smart Home Kits. https:\/\/developer.apple.com\/library\/content\/documentation. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_5_1","unstructured":"bitcoinWiki. 2017. Transaction. https:\/\/en.bitcoin.it\/wiki\/Transaction. (2017). Accessed on January 05 2017.  bitcoinWiki. 2017. Transaction. https:\/\/en.bitcoin.it\/wiki\/Transaction. (2017). Accessed on January 05 2017."},{"key":"e_1_3_2_1_6_1","first-page":"514","article-title":"Short signatures from theWeil pairing","volume":"2001","author":"Boneh Dan","year":"2001","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Denis Butin and Daniel Le M\u00e9tayer. 2014. Log Analysis for Data Protection Accountability. In FM. 163--178.  Denis Butin and Daniel Le M\u00e9tayer. 2014. Log Analysis for Data Protection Accountability. In FM. 163--178.","DOI":"10.1007\/978-3-319-06410-9_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_16"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.10.015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_12_1","unstructured":"International Organization for Standardization. 2016. ISO\/IEC 20922:2016 - Information technology - Message Queuing Telemetry Transport (MQTT) v3.1.1. https:\/\/www.iso.org\/standard\/69466.html. (2016). Accessed on July 01 2017.  International Organization for Standardization. 2016. ISO\/IEC 20922:2016 - Information technology - Message Queuing Telemetry Transport (MQTT) v3.1.1. https:\/\/www.iso.org\/standard\/69466.html. (2016). Accessed on July 01 2017."},{"key":"e_1_3_2_1_13_1","unstructured":"Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version (1998) 86--97.  Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version (1998) 86--97."},{"volume-title":"3rd international conference on. IEEE, 791--798","year":"2008","author":"Hunkeler Urs","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"IBM. 2017. Watson IoT Platform. https:\/\/console.bluemix.net\/docs\/services\/IoT\/iotplatform. (2017). Accessed on July 27 2017.  IBM. 2017. Watson IoT Platform. https:\/\/console.bluemix.net\/docs\/services\/IoT\/iotplatform. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_16_1","unstructured":"Johan Ivarsson and Andreas Nilsson. 2010. A Review of Hardware Security Modules. https:\/\/www.opendnssec.org\/wp-content\/uploads\/2011\/01\/A-Review-of-Hardware-Security-Modules-Fall-2010.pdf. (2010).  Johan Ivarsson and Andreas Nilsson. 2010. A Review of Hardware Security Modules. https:\/\/www.opendnssec.org\/wp-content\/uploads\/2011\/01\/A-Review-of-Hardware-Security-Modules-Fall-2010.pdf. (2010)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2013.2296516"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33962-2_17"},{"key":"e_1_3_2_1_19_1","unstructured":"Ben Lynn. 2017. https:\/\/crypto.stanford.edu\/pbc\/. (2017). Accessed on July 27 2017.  Ben Lynn. 2017. https:\/\/crypto.stanford.edu\/pbc\/. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368361"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.18"},{"key":"e_1_3_2_1_22_1","first-page":"2","article-title":"A new approach to secure logging","volume":"5","author":"Ma Di","year":"2009","journal-title":"ACM Transactions on Storage (TOS)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_3"},{"volume-title":"Report Dagstuhl Seminar on Time Services Schlo\u00df Dagstuhl, March","author":"Mills David L.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Mosquitto. 2017. An Open SourceMQTT v3.1\/v3.1.1 Broker. https:\/\/mosquitto.org. (2017). Accessed on July 27 2017.  Mosquitto. 2017. An Open SourceMQTT v3.1\/v3.1.1 Broker. https:\/\/mosquitto.org. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_27_1","unstructured":"Satoshi Nakamoto. 2017. Bitcoin. https:\/\/bitcoin.org\/en\/. (2017). Accessed on July 27 2017.  Satoshi Nakamoto. 2017. Bitcoin. https:\/\/bitcoin.org\/en\/. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_28_1","unstructured":"Samsung. 2017. SmartThings. http:\/\/docs.smartthings.com\/en\/latest\/getting-started\/overview.html. (2017). Accessed on July 27 2017.  Samsung. 2017. SmartThings. http:\/\/docs.smartthings.com\/en\/latest\/getting-started\/overview.html. (2017). Accessed on July 27 2017."},{"key":"e_1_3_2_1_29_1","unstructured":"Bruce Schneier. 2017. Security and the Internet of Things. https:\/\/www.schneier.com\/blog\/archives\/2017\/02\/security_and_th.html. (February 2017). Accessed on August 01 2017.  Bruce Schneier. 2017. Security and the Internet of Things. https:\/\/www.schneier.com\/blog\/archives\/2017\/02\/security_and_th.html. (February 2017). Accessed on August 01 2017."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"e_1_3_2_1_32_1","unstructured":"Ben Zhang Nitesh Mor John Kolb Douglas S. Chan Ken Lutz Eric Allman JohnWawrzynek Edward A. Lee and John Kubiatowicz. 2015. The Cloud is Not Enough: Saving IoT from the Cloud. In HotCloud.  Ben Zhang Nitesh Mor John Kolb Douglas S. Chan Ken Lutz Eric Allman JohnWawrzynek Edward A. Lee and John Kubiatowicz. 2015. The Cloud is Not Enough: Saving IoT from the Cloud. In HotCloud."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Internet of Things Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139937.3139945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139937.3139945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139937.3139945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":31,"alternative-id":["10.1145\/3139937.3139945","10.1145\/3139937"],"URL":"https:\/\/doi.org\/10.1145\/3139937.3139945","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}