{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":168102,"items":[{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:55:32Z","timestamp":1760147732810,"version":"build-2065373602"},"reference-count":0,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T00:00:00Z","timestamp":1677283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IoT"],"abstract":"<jats:p>High-quality academic publishing is built on rigorous peer review [...]<\/jats:p>","DOI":"10.3390\/iot4010003","type":"journal-article","created":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T05:20:50Z","timestamp":1677475250000},"page":"56-56","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Acknowledgment to the Reviewers of IoT in 2022"],"prefix":"10.3390","volume":"4","author":[{"given":"IoT","family":"IoT Editorial Office","sequence":"first","affiliation":[{"name":"MDPI AG, St. Alban-Anlage 66, 4052 Basel, Switzerland"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,25]]},"container-title":["IoT"],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-831X\/4\/1\/3\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:42:16Z","timestamp":1760121736000},"score":13.100826,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-831X\/4\/1\/3"}},"issued":{"date-parts":[[2023,2,25]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["iot4010003"],"URL":"https:\/\/doi.org\/10.3390\/iot4010003","ISSN":["2624-831X"],"issn-type":[{"type":"electronic","value":"2624-831X"}],"published":{"date-parts":[[2023,2,25]]}},{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:47:14Z","timestamp":1760150834882,"version":"build-2065373602"},"reference-count":0,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T00:00:00Z","timestamp":1643328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IoT"],"abstract":"<jats:p>Rigorous peer-reviews are the basis of high-quality academic publishing [...]<\/jats:p>","DOI":"10.3390\/iot3010007","type":"journal-article","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T05:26:17Z","timestamp":1643433977000},"page":"122-122","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Acknowledgment to Reviewers of IoT in 2021"],"prefix":"10.3390","volume":"3","author":[{"name":"IoT Editorial Office","sequence":"first","affiliation":[]}],"member":"1968","published-online":{"date-parts":[[2022,1,28]]},"container-title":["IoT"],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-831X\/3\/1\/7\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:10:02Z","timestamp":1760134202000},"score":12.686942,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-831X\/3\/1\/7"}},"issued":{"date-parts":[[2022,1,28]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["iot3010007"],"URL":"https:\/\/doi.org\/10.3390\/iot3010007","ISSN":["2624-831X"],"issn-type":[{"type":"electronic","value":"2624-831X"}],"published":{"date-parts":[[2022,1,28]]}},{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T03:28:58Z","timestamp":1648610938949},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30419733","type":"standard","created":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T20:34:27Z","timestamp":1589488467000},"approved":{"date-parts":[[2020,5,31]]},"source":"Crossref","is-referenced-by-count":1,"title":["Internet of things (IoT) \ufffd Industrial IoT"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T20:34:29Z","timestamp":1589488469000},"score":12.455571,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030419733?restype=standard"}},"subtitle":[""],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30419733"},{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:14:51Z","timestamp":1648952091856},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30419733u","type":"standard","created":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T20:34:27Z","timestamp":1589488467000},"approved":{"date-parts":[[2020,5,31]]},"source":"Crossref","is-referenced-by-count":1,"title":["Internet of things (IoT) \ufffd Industrial IoT"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T20:34:31Z","timestamp":1589488471000},"score":12.437846,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030419733?restype=undated"}},"subtitle":[""],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30419733u"},{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T04:00:53Z","timestamp":1747108853323,"version":"3.40.5"},"publisher":"Publications Office of the European Union","award-start":{"date-parts":[[2018,7,1]]},"award":"777855","DOI":"10.3030\/777855","type":"grant","created":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T13:46:36Z","timestamp":1670852796000},"source":"Crossref","prefix":"10.3030","member":"4854","project":[{"project-title":[{"title":"A Framework for Pairing Circular Economy and IoT: IoT as an enabler of the Circular Economy  circularity-by-design as an enabler for IoT (CE-IoT)","language":"en"},{"title":"CE-IOT","language":"en"}],"project-description":[{"description":"The overall aim of CE-IoT is to develop an innovative framework of interplay between Circular Economy and IoT, to explore novel ways in which this interaction can drastically change the nature of products, services, business models and ecosystems. The CE-IoT framework will be bi-dimensional and bi-directional in terms of circularity, aiming to develop (i) novel circular economy business models and service supply chains to unlock CE-IoT synergies in order to generate direct value for customers\/end-users and augmenting resource productivity across economies by forming new ecosystems that eliminate both negative externalities and the need for considerable resources altogether, and (ii) open, circular-by-design IoT architecture, where \u201csmart\u201d IoT objects (e.g., sensors, devices, systems and components) are integrated in the IoT ecosystem through patterns  with proven key circularity-enabling properties (scalable connectivity, end-to-end security\/privacy, dependability and interoperability) to maximize IoT resource and data harvesting in a new breed of circular-by-design IoT ecosystems.\nTo achieve its overall aim, CE-IoT will undertake research and innovation activities to (i) establish a comprehensive framework with IoT as a key enabling and facilitating technology of the circular economy from a business perspective based on circular economy design patterns, (ii) to develop an open modular, circular-by-design IoT architecture based on IoT architectural design patterns and (iii) to integrate an overarching pattern-driven CE-IoT framework covering both business and technical aspects.\nCE-IoT will carry out comprehensive evaluation of the CE-IoT framework covering business, technical and legal aspects through two demonstrators in the domains of telecommunication and cloud services and will create conditions for effectuating circular economy principles through seamless integration with IoT technology and to broaden the use of the CE-IoT framework.","language":"en"}],"award-amount":{"amount":1692000.0,"currency":"EUR"},"award-start":{"date-parts":[[2018,7,1]]},"funding":[{"type":"grant","scheme":"H2020-EU.1.3.","award-amount":{"amount":1692000.0,"currency":"EUR","percentage":100},"funder":{"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}],"name":"H2020 Marie Sk\u0142odowska-Curie Actions"}}]}],"deposited":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T07:32:36Z","timestamp":1747035156000},"score":12.29678,"resource":{"primary":{"URL":"https:\/\/cordis.europa.eu\/project\/id\/777855"}},"issued":{"date-parts":[[2018,7,1]]},"URL":"https:\/\/doi.org\/10.3030\/777855"},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:26Z","timestamp":1654965746956},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.016","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"293-305","source":"Crossref","is-referenced-by-count":0,"title":["Healthcare IoT"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/23E47F1E6B712ADA1C499CB80B38C6D1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:56Z","timestamp":1654963736000},"score":12.293297,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c14\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.016","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T21:10:53Z","timestamp":1686085853139},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/bsisoiec21823","type":"standard","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T21:30:57Z","timestamp":1550525457000},"source":"Crossref","is-referenced-by-count":1,"title":["Internet of Things (IoT). Interoperability for IoT systems"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T20:31:28Z","timestamp":1686083488000},"score":12.283269,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000000000000?restype=series&lookup=BS+ISO+IEC+21823"}},"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/bsisoiec21823"},{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T16:43:31Z","timestamp":1649177011072},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30411141","type":"standard","created":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T21:30:12Z","timestamp":1640208612000},"approved":{"date-parts":[[2021,12,31]]},"source":"Crossref","is-referenced-by-count":0,"title":["Internet of things (IoT) \ufffd Real-time IoT framework"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T21:30:22Z","timestamp":1640208622000},"score":12.2537775,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030411141?restype=standard"}},"subtitle":[""],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30411141"},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:33Z","timestamp":1654965753453},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.019","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"355-374","source":"Crossref","is-referenced-by-count":0,"title":["IoT Analytics"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/5A9525A2264744007A5EC948D2C0C1D8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:59Z","timestamp":1654963739000},"score":12.253133,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c17\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.019","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:36:20Z","timestamp":1725885380443},"publisher-location":"Berkeley, CA","reference-count":0,"publisher":"Apress","isbn-type":[{"type":"print","value":"9781484221426"},{"type":"electronic","value":"9781484221433"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-1-4842-2143-3_3","type":"book-chapter","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T05:28:43Z","timestamp":1492666123000},"page":"41-55","source":"Crossref","is-referenced-by-count":2,"title":["Azure IoT Hub"],"prefix":"10.1007","author":[{"given":"Scott","family":"Klein","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,21]]},"container-title":["IoT Solutions in Microsoft's Azure IoT Suite"],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4842-2143-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T05:28:46Z","timestamp":1492666126000},"score":12.224598,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4842-2143-3_3"}},"issued":{"date-parts":[[2017]]},"ISBN":["9781484221426","9781484221433"],"references-count":0,"URL":"https:\/\/doi.org\/10.1007\/978-1-4842-2143-3_3","published":{"date-parts":[[2017]]}},{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:19Z","timestamp":1761401959564},"reference-count":0,"publisher":"River Publisher","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2018]]},"DOI":"10.13052\/rp-9788770220057","type":"book-chapter","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T09:24:13Z","timestamp":1528104253000},"page":"1-92","source":"Crossref","is-referenced-by-count":8,"title":["Advancing IoT Platforms Interoperability"],"prefix":"10.13052","author":[{"given":"Ovidiu","family":"Vermesan","sequence":"first","affiliation":[]}],"member":"5195","container-title":["Advancing IoT Platforms Interoperability"],"deposited":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T09:24:14Z","timestamp":1528104254000},"score":12.224598,"resource":{"primary":{"URL":"http:\/\/riverpublishers.com\/dissertations_xml\/9788770220057\/9788770220057.xml"}},"issued":{"date-parts":[[2018]]},"references-count":0,"URL":"https:\/\/doi.org\/10.13052\/rp-9788770220057","published":{"date-parts":[[2018]]}},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:32Z","timestamp":1654965752556},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.011","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"214-234","source":"Crossref","is-referenced-by-count":0,"title":["IoT Interoperability"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/D3557801155168C2F9F831744D57D67C","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:51Z","timestamp":1654963731000},"score":12.205165,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c9\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.011","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:33Z","timestamp":1654965753440},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.014","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"271-282","source":"Crossref","is-referenced-by-count":0,"title":["Agricultural IoT"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/100A75BB94DE6B4ADF05D09F7187D5AF","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:54Z","timestamp":1654963734000},"score":12.205165,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c12\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.014","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:51:34Z","timestamp":1705967494129},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.015","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"283-292","source":"Crossref","is-referenced-by-count":1,"title":["Vehicular IoT"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/EEB709141EB5C5D7063E0C78ECDE316C","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:55Z","timestamp":1654963735000},"score":12.196991,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c13\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.015","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T05:45:59Z","timestamp":1648878359783},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30411141u","type":"standard","created":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T21:30:12Z","timestamp":1640208612000},"approved":{"date-parts":[[2021,12,31]]},"source":"Crossref","is-referenced-by-count":0,"title":["Internet of things (IoT) \ufffd Real-time IoT framework"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T21:30:23Z","timestamp":1640208623000},"score":12.196623,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030411141?restype=undated"}},"subtitle":[""],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30411141u"},{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:27:02Z","timestamp":1715732822065},"publisher-location":"New York","edition-number":"1","reference-count":0,"publisher":"River Publishers","isbn-type":[{"value":"9781003337126","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1201\/9781003337126-4","type":"book-chapter","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T07:20:11Z","timestamp":1689751211000},"page":"25-65","source":"Crossref","is-referenced-by-count":0,"title":["IoT-EPI Projects approaches addressing IoT platforms interoperability"],"prefix":"10.1201","author":[{"given":"Ovidiu","family":"Vermesan","sequence":"first","affiliation":[]}],"member":"301","container-title":["Advancing IoT Platforms Interoperability"],"language":"en","deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T07:20:18Z","timestamp":1689751218000},"score":12.19101,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781003337126\/chapters\/10.1201\/9781003337126-4"}},"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9781003337126"],"references-count":0,"URL":"https:\/\/doi.org\/10.1201\/9781003337126-4","published":{"date-parts":[[2022,9,1]]}},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:39Z","timestamp":1654965759362},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.005","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"48-72","source":"Crossref","is-referenced-by-count":0,"title":["Predecessors of IoT"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/8C03D11C464D271A45DD3768D7F827CE","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:45Z","timestamp":1654963725000},"score":12.171564,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c3\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.005","published":{"date-parts":[[2021,2,28]]}},{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:18:19Z","timestamp":1743013099078,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":66,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658324384"},{"type":"electronic","value":"9783658324391"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-658-32439-1_21","type":"book-chapter","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T15:04:36Z","timestamp":1619708676000},"page":"395-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IoT Security Best Practices"],"prefix":"10.1007","author":[{"given":"Marco","family":"Barenkamp","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,30]]},"reference":[{"key":"21_CR1","unstructured":"Amann B, Vallentin M, Hall S, Sommer R (2012) Revisiting SSL: a large-scale study of the internet\u2019s most trusted protocol. ICSI Tech Rep. http:\/\/icir.org\/johanna\/papers\/icsi12revisitingssl.pdf"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"406","DOI":"10.15547\/tjs.2017.s.01.068","volume":"15","author":"N Angelova","year":"2017","unstructured":"Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406\u2013412","journal-title":"Trakia J Sci"},{"issue":"15","key":"21_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Computer Netw 54(15):2787\u20132805","journal-title":"Computer Netw"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MC.2006.94","volume":"39","author":"M Badra","year":"2006","unstructured":"Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58\u201366","journal-title":"Computer"},{"issue":"6","key":"21_CR5","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1002\/sec.803","volume":"7","author":"N Bagheri","year":"2014","unstructured":"Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation\u2014RAPP. Secur Commun Netw 7(6):945\u2013949","journal-title":"Secur Commun Netw"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009, November) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, S 19\u201330, Chicago Illinois USA","DOI":"10.1145\/1655008.1655012"},{"key":"21_CR7","unstructured":"BMWi (Bundesministerium f\u00fcr Wirtschaft und Energie) (2019) Das Projekt GAIA-X. https:\/\/www.bmwi.de\/Redaktion\/DE\/Publikationen\/Digitale-Welt\/das-projekt-gaia-x.pdf?__blob=publicationFile&v=24. Zugegriffen am 08.06.2020"},{"key":"21_CR8","unstructured":"BMWi (Bundesministerium f\u00fcr Wirtschaft und Energie) (2020) GAIA-X. https:\/\/www.bmwi.de\/Redaktion\/DE\/Dossier\/gaia-x.html. Zugegriffen am 08.06.2020"},{"issue":"9","key":"21_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600528","volume":"55","author":"C Brewster","year":"2017","unstructured":"Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26\u201333","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MWC.2015.7096294","volume":"22","author":"D Camps-Mur","year":"2015","unstructured":"Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. IEEE Wirel Commun 22(2):118\u2013125","journal-title":"IEEE Wirel Commun"},{"key":"21_CR11","unstructured":"Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols--LDAPv3"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 internet measurement conference, Santa Monica, S 527\u2013541","DOI":"10.1145\/2987443.2987454"},{"key":"21_CR13","unstructured":"Churchill L (2020) IoT onboarding: the challenges businesses face \u2013 and the solutions. Tech See, intelligent visual Assistance. https:\/\/techsee.me\/blog\/iot-onboarding\/. Zugegriffen am 03.04.2020"},{"key":"21_CR14","first-page":"1","volume":"5280","author":"D Cooper","year":"2008","unstructured":"Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280:1\u2013151","journal-title":"RFC"},{"key":"21_CR15","unstructured":"Czernik A (2016) Authentisierung, Authentifizierung und Autorisierung, Datenschutzbeauftragter-Info. https:\/\/www.datenschutzbeauftragter-info.de\/authentisierung-authentifizierung-und-autorisierung\/. Zugegriffen am 03.04.2020"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.pmcj.2014.11.001","volume":"20","author":"I Erguler","year":"2015","unstructured":"Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115\u2013126","journal-title":"Pervasive Mob Comput"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11552055_45","volume-title":"IFIP international conference on communications and multimedia security","author":"S Farrell","year":"2005","unstructured":"Farrell S, Kahan J (2005, September) Using the XML key management specification (and breaking x. 509 rules as you go. In: IFIP international conference on communications and multimedia security. Springer, Berlin\/Heidelberg, S 348\u2013357"},{"issue":"7","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s16071141","volume":"16","author":"FJ Ferr\u00e1ndez-Pastor","year":"2016","unstructured":"Ferr\u00e1ndez-Pastor FJ, Garc\u00eda-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Mart\u00ednez J (2016) Developing ubiquitous sensor network platform using internet of things: Application in precision agriculture. Sensors 16(7):1141","journal-title":"Sensors"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Fischer K, Ge\u00dfner J (2012) Security architecture elements for IoT enabled automation networks. In: Proceedings of 2012 IEEE 17th international conference on Emerging Technologies & Factory Automation (ETFA 2012). IEEE, Krakow, S 1\u20138","DOI":"10.1109\/ETFA.2012.6489651"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Gansemer S, Sell J, Schulz S, Horster B, Horster-M\u00f6ller T, Rusch C et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd international symposium on wireless systems within the conferences on intelligent data acquisition and advanced computing systems. IEEE, Offenburg, S 48\u201354","DOI":"10.1109\/IDAACS-SWS.2014.6954622"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on computer and communications security, New York, S 38\u201349","DOI":"10.1145\/2382196.2382204"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Gupta H, and P. C. van Oorschot, \u201eOnboarding and Software Update Architecture for IoT Devices,\u201c 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 2019, pp. 1-11, doi: 10.1109\/PST47121.2019.8949023","DOI":"10.1109\/PST47121.2019.8949023"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Han R, Gramoli V, Xu X (2018) Evaluating blockchains for IoT. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, Paris, S 1\u20135","DOI":"10.1109\/NTMS.2018.8328736"},{"key":"21_CR24","unstructured":"Ikovic O, Bo\u02c7skovic D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: Model and data engineering: 9th international conference, MEDI 2019, Toulouse, France, October 28\u201331, 2019, proceedings, Bd 11815. Springer Nature, Toulouse, S 172"},{"key":"21_CR25","unstructured":"Johnsson K (2017) Was ist Client-authentifizierung, und warum brauche ich sie? Beitrag vom 23.02.2016 in Global Sign blog. https:\/\/www.globalsign.com\/de-de\/blog\/einfuehrung-client-authentifizierung\/. Zugegriffen am 04.04.2020"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Khor JH, Sidorov M (2018) Weakness of ultra-lightweight mutual authentication protocol for IoT devices using RFlD tags. In: 2018 Eighth international conference on Information Science and Technology (ICIST). IEEE, Cordoba, S 91\u201397","DOI":"10.1109\/ICIST.2018.8426178"},{"key":"21_CR27","unstructured":"Koutanov, E. (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java. Obsidian Dynamics"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In Proceedings of the 2014, IEEE international symposiumon next-generation electronics, Kwei-Shan, Taiwan, 7\u201310.05 2014, S 1\u20132","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2018.04.061","volume":"86","author":"K Leng","year":"2018","unstructured":"Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Futur Gener Comput Syst 86:641\u2013649","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"21_CR30","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243\u2013259","journal-title":"Inf Syst Front"},{"key":"21_CR31","unstructured":"Lu RJ, Liu ZG, Zheng XH (2006) United authentication platform based on HTTPS tunnel technology [J]. Application research of computers, College of Computer Science, Southwest University of Science & Technology, Mianyang Sichuan, S 12"},{"key":"21_CR32","unstructured":"Luber S, Schmitz P (2017) Was ist TLS?, Security Insider, Beitrag vm 28.12.2017. https:\/\/www.security-insider.de\/was-ist-tls-transport-layer-security-a-673066\/. Zugegriffen am 05.04.2020"},{"key":"21_CR33","unstructured":"Mayer CP (2009) Security and privacy challenges in the internet of things. Electronic Communications of the EASST, Kassel, S 17"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Mendez M, Papapanagiotou I, Yang B (2018) Internet of things: survey on security, information security journa. Glob Perspect 27(3):162\u2013182. https:\/\/doi.org\/10.1080\/19393555.2018.1458258","DOI":"10.1080\/19393555.2018.1458258"},{"key":"21_CR35","unstructured":"Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint. Cornell University. http:\/\/arxiv.org\/abs\/1808.03071"},{"key":"21_CR36","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.procs.2016.07.275","volume":"93","author":"I Mohanraj","year":"2016","unstructured":"Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Prog Comput Sci 93:931\u2013939","journal-title":"Prog Comput Sci"},{"issue":"6","key":"21_CR37","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/s11119-009-9134-0","volume":"10","author":"E Nash","year":"2009","unstructured":"Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546","journal-title":"Precis Agric"},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.compag.2015.08.011","volume":"118","author":"T Ojha","year":"2015","unstructured":"Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66\u201384","journal-title":"Comput Electron Agric"},{"issue":"16","key":"21_CR39","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ifacol.2016.10.024","volume":"49","author":"T Oksanen","year":"2016","unstructured":"Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127\u2013131","journal-title":"IFAC-PapersOnLine"},{"key":"21_CR40","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-319-46568-5_53","volume-title":"Europe and MENA cooperation advances in information and communication technologies","author":"A Ouaddah","year":"2017","unstructured":"Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523\u2013533"},{"key":"21_CR41","unstructured":"Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012). Internet of things (Iot) and cloud computing for agriculture: an overview. Proceedings of agro-informatics and precision agriculture (AIPA 2012), India, 292\u2013296"},{"key":"21_CR42","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-32065-2_12","volume-title":"International conference on model and data engineering","author":"S Pe\u0161i\u0107","year":"2019","unstructured":"Pe\u0161i\u0107 S, Radovanovi\u0107 M, Ivanovi\u0107 M, To\u0161i\u0107 M, Ikovi\u0107 O, Bo\u0161kovi\u0107 D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International conference on model and data engineering. Springer, Cham, S 172\u2013183"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE wireless communications and networking conference (WCNC). IEEE, Istanbul, S 2728\u20132733","DOI":"10.1109\/WCNC.2014.6952860"},{"issue":"3","key":"21_CR44","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/robotics6030019","volume":"6","author":"I Potamitis","year":"2017","unstructured":"Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19","journal-title":"Robotics"},{"key":"21_CR45","doi-asserted-by":"crossref","unstructured":"Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 international conference on internet of things and applications (IOTA). IEEE, Pune S 137\u2013142","DOI":"10.1109\/IOTA.2016.7562710"},{"key":"21_CR46","unstructured":"Schiller K (2020) Was ist Blockchain? \u2013 Definition, Blockchain-Welt, Beitrag vom 12.02.2020. https:\/\/blockchainwelt.de\/blockchain-was-ist-das\/. Zugegriffen am 03.04.2020"},{"key":"21_CR47","volume-title":"Kryptografie: Verfahren, Protokolle, Infrastrukturen","author":"K Schmeh","year":"2016","unstructured":"Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt, Heidelberg"},{"key":"21_CR48","first-page":"28","volume-title":"Cryptographers\u2019 track at the RSA conference","author":"H Shacham","year":"2001","unstructured":"Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers\u2019 track at the RSA conference. Springer, Berlin\/Heidelberg, S 28\u201343"},{"key":"21_CR50","unstructured":"Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE, New Delhi, S 1456\u20131458"},{"issue":"8","key":"21_CR51","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.3390\/s19081833","volume":"19","author":"X Shi","year":"2019","unstructured":"Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833","journal-title":"Sensors"},{"key":"21_CR52","doi-asserted-by":"crossref","unstructured":"Shin S, Kobara K (2016) A security framework for MQTT. In 2016 IEEE conference on communications and network security (CNS), Philadelphia, S 432\u2013436","DOI":"10.1109\/CNS.2016.7860532"},{"key":"21_CR53","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"issue":"2","key":"21_CR54","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/15536548.2011.10855909","volume":"7","author":"AS Sodiya","year":"2011","unstructured":"Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inform Privacy Secur 7(2):3\u201327","journal-title":"J Inform Privacy Secur"},{"key":"21_CR55","doi-asserted-by":"crossref","unstructured":"Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. In: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Halifax, S 1129\u20131136","DOI":"10.1109\/Cybermatics_2018.2018.00205"},{"key":"21_CR56","unstructured":"Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on client-server architecture for accessing cloud computing. Int J Emerg Technol Adv Eng 2(7):95\u201399"},{"key":"21_CR57","doi-asserted-by":"crossref","unstructured":"Sto\u010des M, Van\u011bk J, Masner J, Pavl\u00edk J (2016) Internet of Things (IoT) in agriculture \u2013 selected aspects. AGRIS on-line Papers in Economics and Informatics, Bd 8, No. 1, S 83\u201388. ISSN 1804-1930. https:\/\/doi.org\/10.7160\/aol.2016.080108","DOI":"10.7160\/aol.2016.080108"},{"key":"21_CR58","doi-asserted-by":"crossref","unstructured":"Sukhwani H, Mart\u00ednez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th symposium on reliable distributed systems (SRDS). IEEE, S 253\u2013255","DOI":"10.1109\/SRDS.2017.36"},{"key":"21_CR59","unstructured":"Tasca P, Tessone CJ (2017) Taxonomy of blockchain technologies. Principles of identification and classification. arXiv preprint arXiv:1708.04872 https:\/\/arxiv.org\/abs\/1708.04872"},{"key":"21_CR60","unstructured":"Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In The second USENIX workshop on electronic commerce proceedings, Bd 1, No. 1, Oakland, S 29\u201340"},{"issue":"6","key":"21_CR61","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.clsr.2009.09.002","volume":"25","author":"RH Weber","year":"2009","unstructured":"Weber RH (2009) Internet of things\u2013need for a new legal environment? Comput Law Secur Rev. 25(6):522\u2013527","journal-title":"Comput Law Secur Rev."},{"issue":"1","key":"21_CR62","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber RH (2010) Internet of things\u2013new security and privacy challenges. Comput Law Secur Rev 26(1):23\u201330","journal-title":"Comput Law Secur Rev"},{"key":"21_CR63","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/WF-IoT.2016.7845450","volume-title":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","author":"M Wei\u00dfbach","year":"2016","unstructured":"Wei\u00dfbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the internet of things. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), S 171\u2013176"},{"key":"21_CR64","unstructured":"Woodbury C, Botz P (2004) Experts\u2019 guide to OS\/400 & I5\/OS security. System iNetwork"},{"key":"21_CR65","unstructured":"Yewale AJ (2018) Study of blockchain-as-a-service systems with a case study of hyperledger fabric implementation on Kubernetes, Las Vegas"},{"key":"21_CR66","doi-asserted-by":"crossref","unstructured":"Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, Emeishan, S 663\u2013667","DOI":"10.1109\/CIS.2013.145"},{"key":"21_CR67","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, San Jose S 180\u2013184","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Edition HMD","IoT \u2013 Best Practices"],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-32439-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T18:23:37Z","timestamp":1622658217000},"score":12.16834,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-32439-1_21"}},"subtitle":["Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT"],"issued":{"date-parts":[[2021]]},"ISBN":["9783658324384","9783658324391"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-32439-1_21","ISSN":["2366-1127","2366-1135"],"issn-type":[{"type":"print","value":"2366-1127"},{"type":"electronic","value":"2366-1135"}],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]},{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T11:34:47Z","timestamp":1648726487881},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30423759u","type":"standard","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T21:47:31Z","timestamp":1636494451000},"approved":{"date-parts":[[2021,7,13]]},"source":"Crossref","is-referenced-by-count":0,"title":["Internet of things (IoT). Underwater communication technologies for IoT"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T22:01:54Z","timestamp":1636495314000},"score":12.118297,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030423759?restype=undated"}},"subtitle":[""],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30423759u"},{"indexed":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:42:39Z","timestamp":1654965759466},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,2,28]]},"DOI":"10.1017\/9781108913560.010","type":"other","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T02:09:37Z","timestamp":1610158177000},"page":"163-213","source":"Crossref","is-referenced-by-count":0,"title":["IoT Communication Technologies"],"prefix":"10.1017","member":"56","container-title":["Introduction to IoT"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/BA3D6A11CD7EA51F2BF974451FD9C598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T16:08:49Z","timestamp":1654963729000},"score":12.085529,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108913560%23c8\/type\/book_part"}},"issued":{"date-parts":[[2021,2,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/9781108913560.010","published":{"date-parts":[[2021,2,28]]}}],"items-per-page":20,"query":{"start-index":0,"search-terms":"iot"}}}