{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:41Z","timestamp":1750220861892,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T00:00:00Z","timestamp":1571702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,22]]},"DOI":"10.1145\/3365871.3365876","type":"proceedings-article","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T14:25:56Z","timestamp":1573050356000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Trusted Lightweight Communication for IoT Systems Using Hardware Security"],"prefix":"10.1145","author":[{"given":"Arnaud","family":"Durand","sequence":"first","affiliation":[{"name":"University of Fribourg, Fribourg, Switzerland"}]},{"given":"Pascal","family":"Gremaud","sequence":"additional","affiliation":[{"name":"University of Fribourg, Fribourg, Switzerland"}]},{"given":"Jacques","family":"Pasquier","sequence":"additional","affiliation":[{"name":"University of Fribourg, Fribourg, Switzerland"}]},{"given":"Urs","family":"Gerber","sequence":"additional","affiliation":[{"name":"University of Bern, Bern, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862423"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"e_1_3_2_1_3_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"IACR Cryptology ePrint Archive"},{"volume-title":"Performance Principles for Trusted Computing with Intel SGX","author":"Gjerdrum Anders T.","key":"e_1_3_2_1_4_1","unstructured":"Anders T. Gjerdrum , Robert Pettersen , H\u00e5vard D. Johansen , and Dag Johansen . 2018. Performance Principles for Trusted Computing with Intel SGX . In Cloud Computing and Service Science, Donald Ferguson, V\u00edctor M\u00e9ndez Mu\u00f1oz, Jorge Cardoso, Markus Helfert, and Claus Pahl (Eds.). Springer International Publishing , Cham , 1--18. Anders T. Gjerdrum, Robert Pettersen, H\u00e5vard D. Johansen, and Dag Johansen. 2018. Performance Principles for Trusted Computing with Intel SGX. In Cloud Computing and Service Science, Donald Ferguson, V\u00edctor M\u00e9ndez Mu\u00f1oz, Jorge Cardoso, Markus Helfert, and Claus Pahl (Eds.). Springer International Publishing, Cham, 1--18."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3140258"},{"key":"e_1_3_2_1_6_1","volume-title":"From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices","author":"Guinard Dominique","year":"1915","unstructured":"Dominique Guinard , Vlad Trifa , Friedemann Mattern , and Erik Wilde . 2011. From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices . Springer Berlin Heidelberg , Berlin, Heidelberg , 97--129. https:\/\/doi.org\/10.1007\/978-3-642- 1915 7-2_5 10.1007\/978-3-642-19157-2_5 Dominique Guinard, Vlad Trifa, Friedemann Mattern, and Erik Wilde. 2011. From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices. Springer Berlin Heidelberg, Berlin, Heidelberg, 97--129. https:\/\/doi.org\/10.1007\/978-3-642-19157-2_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.15.1.827"},{"key":"e_1_3_2_1_8_1","unstructured":"John Mattsson and Francesca Palombini. 2019. Comparison of CoAP Security Protocols. Internet-Draft draft-ietf-lwig-security-protocol-comparison-03. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-lwig-security-protocol-comparison-03 Work in Progress.  John Mattsson and Francesca Palombini. 2019. Comparison of CoAP Security Protocols. Internet-Draft draft-ietf-lwig-security-protocol-comparison-03. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-lwig-security-protocol-comparison-03 Work in Progress."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_10_1","unstructured":"Ludwig Seitz G\u00f6ran Selander Erik Wahlstroem Samuel Erdtman and Hannes Tschofenig. 2019. Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth). Internet-Draft draft-ietf-ace-oauth-authz-22. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ace-oauth-authz-22 Work in Progress.  Ludwig Seitz G\u00f6ran Selander Erik Wahlstroem Samuel Erdtman and Hannes Tschofenig. 2019. Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth). Internet-Draft draft-ietf-ace-oauth-authz-22. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ace-oauth-authz-22 Work in Progress."},{"key":"e_1_3_2_1_11_1","unstructured":"G\u00f6ran Selander John Mattsson and Francesca Palombini. 2019. Ephemeral Diffie-Hellman Over COSE (EDHOC). Internet-Draft draft-selander-ace-cose-ecdhe-12. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-selander-ace-cose-ecdhe-12 Work in Progress.  G\u00f6ran Selander John Mattsson and Francesca Palombini. 2019. Ephemeral Diffie-Hellman Over COSE (EDHOC). Internet-Draft draft-selander-ace-cose-ecdhe-12. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-selander-ace-cose-ecdhe-12 Work in Progress."},{"key":"#cr-split#-e_1_3_2_1_12_1.1","doi-asserted-by":"crossref","unstructured":"G\u00f6ran Selander John Mattsson Francesca Palombini and Ludwig Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. https:\/\/doi.org\/10.17487\/RFC8613 10.17487\/RFC8613","DOI":"10.17487\/RFC8613"},{"key":"#cr-split#-e_1_3_2_1_12_1.2","doi-asserted-by":"crossref","unstructured":"G\u00f6ran Selander John Mattsson Francesca Palombini and Ludwig Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. https:\/\/doi.org\/10.17487\/RFC8613","DOI":"10.17487\/RFC8613"}],"event":{"name":"IoT 2019: 9th International Conference on the Internet of Things","acronym":"IoT 2019","location":"Bilbao Spain"},"container-title":["Proceedings of the 9th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365871.3365876","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365871.3365876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365871.3365876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,22]]},"references-count":13,"alternative-id":["10.1145\/3365871.3365876","10.1145\/3365871"],"URL":"https:\/\/doi.org\/10.1145\/3365871.3365876","relation":{},"subject":[],"published":{"date-parts":[[2019,10,22]]},"assertion":[{"value":"2019-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}