{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:02:30Z","timestamp":1758124950587,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,5]],"date-time":"2017-11-05T00:00:00Z","timestamp":1509840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,5]]},"DOI":"10.1145\/3137003.3137013","type":"proceedings-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T14:22:01Z","timestamp":1514557321000},"page":"20-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Adaptable End-To-End Security For Mobile IoT Sensing Applications"],"prefix":"10.1145","author":[{"given":"Jorge","family":"Granjal","sequence":"first","affiliation":[{"name":"CISUC\/DEI, University of Coimbra, Portugal"}]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[{"name":"CISUC\/DEI, University of Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2017,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).  Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_2_1","unstructured":"D. Garcia. 2016. Application Layer Security for CoAP using the (D)TLS Record Layer. (2016).  D. Garcia. 2016. Application Layer Security for CoAP using the (D)TLS Record Layer. (2016)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497235"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38401-1_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"e_1_3_2_1_7_1","unstructured":"IEEE. 2006. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). (2006).  IEEE. 2006. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). (2006)."},{"key":"e_1_3_2_1_8_1","unstructured":"IETF. 2004. IPv6 over Low power WPAN (6lowpan). (2004). https:\/\/datatracker.ietf.org\/wg\/6lowpan\/charter  IETF. 2004. IPv6 over Low power WPAN (6lowpan). (2004). https:\/\/datatracker.ietf.org\/wg\/6lowpan\/charter"},{"key":"e_1_3_2_1_9_1","unstructured":"IETF. 2007. Routing Over Low power and Lossy networks (roll). (2007). https:\/\/datatracker.ietf.org\/wg\/roll\/charter  IETF. 2007. Routing Over Low power and Lossy networks (roll). (2007). https:\/\/datatracker.ietf.org\/wg\/roll\/charter"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386853.1378356"},{"key":"e_1_3_2_1_11_1","unstructured":"LibCoAP. 2017. LibCoAP. (2017). http:\/\/sourceforge.net\/projects\/libcoap  LibCoAP. 2017. LibCoAP. (2017). http:\/\/sourceforge.net\/projects\/libcoap"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla and Nagendra Modadugu. 2012. Datagram transport layer security version 1.2. (2012).  Eric Rescorla and Nagendra Modadugu. 2012. Datagram transport layer security version 1.2. (2012).","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Zach Shelby. 2012. Constrained RESTful environments (CoRE) link format. (2012).  Zach Shelby. 2012. Constrained RESTful environments (CoRE) link format. (2012).","DOI":"10.17487\/rfc6690"},{"key":"e_1_3_2_1_19_1","unstructured":"Memsic Technology. 2010. TelosB Mote Platform. (2010). http:\/\/tinyos.stanford.edu\/tinyos-wiki\/index.php\/TelosB  Memsic Technology. 2010. TelosB Mote Platform. (2010). http:\/\/tinyos.stanford.edu\/tinyos-wiki\/index.php\/TelosB"},{"key":"e_1_3_2_1_20_1","unstructured":"TinyOS. 2017. TinyOS Operating System. (2017). https:\/\/github.com\/tinyos\/tinyos-main  TinyOS. 2017. TinyOS Operating System. (2017). https:\/\/github.com\/tinyos\/tinyos-main"},{"key":"e_1_3_2_1_21_1","volume-title":"RPL: IPv6 routing protocol for low-power and lossy networks.","author":"Winter Tim","year":"2012","unstructured":"Tim Winter . 2012 . RPL: IPv6 routing protocol for low-power and lossy networks. (2012). Tim Winter. 2012. RPL: IPv6 routing protocol for low-power and lossy networks. (2012)."}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Delft Netherlands","acronym":"SenSys '17"},"container-title":["Proceedings of the 1st ACM Workshop on the Internet of Safe Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3137003.3137013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3137003.3137013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:18Z","timestamp":1750212678000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3137003.3137013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,5]]},"references-count":19,"alternative-id":["10.1145\/3137003.3137013","10.1145\/3137003"],"URL":"https:\/\/doi.org\/10.1145\/3137003.3137013","relation":{},"subject":[],"published":{"date-parts":[[2017,11,5]]},"assertion":[{"value":"2017-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}