{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:15:57Z","timestamp":1753600557052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T00:00:00Z","timestamp":1670544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,9]]},"DOI":"10.1145\/3598438.3598451","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T22:11:59Z","timestamp":1687817519000},"page":"85-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security authentication scheme of smart home based on BFP"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7314-7642","authenticated-orcid":false,"given":"Xiaoyu","family":"Du","sequence":"first","affiliation":[{"name":"Henan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-1519","authenticated-orcid":false,"given":"Changtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Henan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7362-7520","authenticated-orcid":false,"given":"Zhijie","family":"Han","sequence":"additional","affiliation":[{"name":"Henan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6951-7727","authenticated-orcid":false,"given":"Guanying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Henan University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_1_2_1","first-page":"596","volume-title":"IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)","author":"Yu R.","year":"2021","unstructured":"R. Yu, X. Zhang and M. Zhang, \u201dSmart Home Security Analysis System Based on The Internet of Things,\u201d2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), 2021, pp. 596-599."},{"key":"e_1_3_2_1_3_1","volume-title":"2016 3rd International Conference on Electronic Design (ICED).","author":"O.","year":"2016","unstructured":"Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016). Internet of Things (IoT): Taxonomy of security attacks. 2016 3rd International Conference on Electronic Design (ICED)."},{"key":"e_1_3_2_1_4_1","first-page":"1361","volume-title":"Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks","author":"Zhu X.","year":"2018","unstructured":"X. Zhu and Y. Badr, \u201dFog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks,\u201d 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1361-1366."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NoF47743.2019.9014960"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983601"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8663145"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3120912"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003621"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00127"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TICST.2015.7369385"}],"event":{"name":"ISBDAI 2022: 2022 3rd International Symposium on Big Data and Artificial Intelligence","acronym":"ISBDAI 2022","location":"Singapore Singapore"},"container-title":["Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3598438.3598451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3598438.3598451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:42Z","timestamp":1750286622000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3598438.3598451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,9]]},"references-count":12,"alternative-id":["10.1145\/3598438.3598451","10.1145\/3598438"],"URL":"https:\/\/doi.org\/10.1145\/3598438.3598451","relation":{},"subject":[],"published":{"date-parts":[[2022,12,9]]},"assertion":[{"value":"2023-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}