{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:42Z","timestamp":1750220922688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T00:00:00Z","timestamp":1558051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,17]]},"DOI":"10.1145\/3321408.3321567","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:17:21Z","timestamp":1563542241000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An efficient access control scheme for smart lock based on asynchronous communication"],"prefix":"10.1145","author":[{"given":"Zhaoyang","family":"Han","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,17]]},"reference":[{"volume-title":"https:\/\/www.grandviewresearch.com\/industry-analysis\/smart-lock-market. Accessed","year":"2018","author":"Grandviewresearch","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8082057"},{"volume-title":"Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. CoRR abs\/1708.05044","year":"2017","author":"Apthorpe N.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18061886"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2016.84006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"volume-title":"Security for the internet of things: A survey of existing protocols and open research issues","year":"2015","author":"Granjal J.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT.2018.8350767"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0087-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2552249"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SST.2018.8564647"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7792955"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"volume-title":"HUPS","year":"2014","author":"Ur B.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3021385.3021389"}],"event":{"name":"ACM TURC 2019: ACM Turing Celebration Conference - China","acronym":"ACM TURC 2019","location":"Chengdu China"},"container-title":["Proceedings of the ACM Turing Celebration Conference - China"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321408.3321567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321408.3321567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:09Z","timestamp":1750204389000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321408.3321567"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,17]]},"references-count":18,"alternative-id":["10.1145\/3321408.3321567","10.1145\/3321408"],"URL":"https:\/\/doi.org\/10.1145\/3321408.3321567","relation":{},"subject":[],"published":{"date-parts":[[2019,5,17]]},"assertion":[{"value":"2019-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}