{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:32:14Z","timestamp":1725615134542},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,16]]},"DOI":"10.1145\/1621890.1621903","type":"proceedings-article","created":{"date-parts":[[2009,10,20]],"date-time":"2009-10-20T12:43:40Z","timestamp":1256042620000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure M2M service space in residential home"],"prefix":"10.1145","author":[{"given":"Juhani","family":"Latvakoski","sequence":"first","affiliation":[{"name":"VTT Technical Research Centre of Finland, Oulu, Finland"}]},{"given":"Tomi","family":"Hautakoski","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Teemu","family":"V\u00e4is\u00e4nen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Jyri","family":"Toivonen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Arto","family":"Lappalainen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Timo","family":"Aarnipuro","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]}],"member":"320","published-online":{"date-parts":[[2009,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"HomeSIP Project: Using the SIP Protocol for Home Automation and M2M homepage. URL: http:\/\/www.enseirb.fr\/cosynux\/HomeSIP\/ HomeSIP Project: Using the SIP Protocol for Home Automation and M2M homepage. URL: http:\/\/www.enseirb.fr\/cosynux\/HomeSIP\/"},{"volume-title":"Proc. IETF Draft. Draft-moyer-sip-appliances-framework-00","year":"2000","author":"Moyer S.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.956113"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1088361.1088371"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646854.708231"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1308947"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9021-1"},{"volume-title":"RFC 1918","year":"1996","author":"IETF","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/505754.505758"},{"key":"e_1_3_2_1_10_1","first-page":"87","volume-title":"Network and Distributed Systems Security Symposium (NDSS'03)","author":"Nikander P.","year":"2003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"IETF RFC4423. Moskowitz R. Nikander P. (2006). \"Host Identity Protocol (HIP) Architecture\". May 2006. IETF RFC4423. Moskowitz R. Nikander P. (2006). \"Host Identity Protocol (HIP) Architecture\". May 2006.","DOI":"10.17487\/rfc4423"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"IETF RFC 5201. Moskowitz R. Nikander P. Jokela P. Ed. Henderson T. (2008) \"Host Identity Protocol\". April 2008. IETF RFC 5201. Moskowitz R. Nikander P. Jokela P. Ed. Henderson T. (2008) \"Host Identity Protocol\". April 2008.","DOI":"10.17487\/rfc5201"},{"key":"e_1_3_2_1_13_1","first-page":"203","volume-title":"Mathematics of Computation 48\"","author":"Koblitz N.","year":"1987"},{"key":"e_1_3_2_1_14_1","unstructured":"Miller V. (1985). \"Use of elliptic curves in cryptography\". CRYPTO 85. Miller V. (1985). \"Use of elliptic curves in cryptography\". CRYPTO 85."},{"key":"e_1_3_2_1_15_1","unstructured":"IETF RFC 1321. Rivest R. (1992). \"The MD5 Message-Digest Algorithm\". April 1992. IETF RFC 1321. Rivest R. (1992). \"The MD5 Message-Digest Algorithm\". April 1992."},{"key":"e_1_3_2_1_16_1","unstructured":"NIST Special Publication 800-57. \"Recommendation for Key Management -- Part 1: General (Revised)\" May 2006 URL: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/SP800-57-Part1.pdf NIST Special Publication 800-57. \"Recommendation for Key Management -- Part 1: General (Revised)\" May 2006 URL: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/SP800-57-Part1.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"\"Specification for the ADVANCED ENCRYPTION STANDARD (AES)\" Federal Information Processing Standard (FIPS) Publication 197 November 2001. \"Specification for the ADVANCED ENCRYPTION STANDARD (AES)\" Federal Information Processing Standard (FIPS) Publication 197 November 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"IETF RFC 4732. Handley M.&Rescorla E. (2006). \"Internet Denial-of-Service Considerations\". November 2006. IETF RFC 4732. Handley M.&Rescorla E. (2006). \"Internet Denial-of-Service Considerations\". November 2006.","DOI":"10.17487\/rfc4732"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"IETF RFC 3561. Perkins C. Belding-Royer E.&Das D. (2003). \"Ad hoc On-Demand Distance Vector (AODV) Routing\". July 2003. IETF RFC 3561. Perkins C. Belding-Royer E.&Das D. (2003). \"Ad hoc On-Demand Distance Vector (AODV) Routing\". July 2003.","DOI":"10.17487\/rfc3561"},{"key":"e_1_3_2_1_21_1","unstructured":"Certicom Research. Standards for efficient cryptography: \"SEC2: Recommended elliptic curve domain parameters\". URL: http:\/\/www.secg.org\/download\/aid-386\/sec2_final.pdf September 2000. Certicom Research. Standards for efficient cryptography: \"SEC2: Recommended elliptic curve domain parameters\". URL: http:\/\/www.secg.org\/download\/aid-386\/sec2_final.pdf September 2000."},{"key":"e_1_3_2_1_22_1","unstructured":"Burr B. (2006). NIST Cryptographic Standards Status Report April 4. 2006 URL: http:\/\/middleware.internet2.edu\/pki06\/proceedings\/burrnist_crypto_standards.ppt Burr B. (2006). NIST Cryptographic Standards Status Report April 4. 2006 URL: http:\/\/middleware.internet2.edu\/pki06\/proceedings\/burrnist_crypto_standards.ppt"},{"key":"e_1_3_2_1_23_1","unstructured":"CNSS Policy No. 15 Fact Sheet No. 1. National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information June 2003. URL: http:\/\/www.cnss.gov\/Assets\/pdf\/cnssp_15_fs.pdf CNSS Policy No. 15 Fact Sheet No. 1. National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information June 2003. URL: http:\/\/www.cnss.gov\/Assets\/pdf\/cnssp_15_fs.pdf"},{"key":"e_1_3_2_1_24_1","unstructured":"Fact Sheet NSA Suite B Cryptography NSA URL: http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm Fact Sheet NSA Suite B Cryptography NSA URL: http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799313_17"},{"volume-title":"Nov 30, 2007. URL: http:\/\/www.cs.colorado.edu\/~jrblack\/papers\/md5e-full.pdf","year":"2007","author":"Stevens M.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Sotirov A. Stevens M. Appelbaum J. Lenstra A. Molnar D. Osvik D. A.&de Weger B. (2008-12-30). \"MD5 considered harmful today\" Announced at the 25th Chaos Communication Congress. URL: http:\/\/www.win.tue.nl\/hashclash\/rogue-ca\/ Sotirov A. Stevens M. Appelbaum J. Lenstra A. Molnar D. Osvik D. A.&de Weger B. (2008-12-30). \"MD5 considered harmful today\" Announced at the 25th Chaos Communication Congress. URL: http:\/\/www.win.tue.nl\/hashclash\/rogue-ca\/"},{"volume-title":"September 20, 2000. URL: http:\/\/www.secg.org\/download\/aid-385\/sec1_final.pdf","author":"Certicom Research","key":"e_1_3_2_1_29_1"},{"volume-title":"American Technology","year":"2004","author":"Krasner J.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"IETF RFC 4880. Callas J. Donnerhacke L. Finney H. Shaw D.&Thayer R. (2007). \"OpenPGP Message Format\". November 2007. IETF RFC 4880. Callas J. Donnerhacke L. Finney H. Shaw D.&Thayer R. (2007). \"OpenPGP Message Format\". November 2007."},{"key":"e_1_3_2_1_32_1","unstructured":"Guerrero Zapata Manel. (2006). \"Secure Ad hoc On-Demand Distance Vector (SAODV) Routing\" September 2006 INTERNET-DRAFT draft-guerrero-manet-saodv-06.txt Guerrero Zapata Manel. (2006). \"Secure Ad hoc On-Demand Distance Vector (SAODV) Routing\" September 2006 INTERNET-DRAFT draft-guerrero-manet-saodv-06.txt"}],"event":{"name":"COMSWARE '09: Fourth International Conference on Communication System Software and Middleware","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACM Association for Computing Machinery","Create-Net","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Dublin Ireland","acronym":"COMSWARE '09"},"container-title":["Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621890.1621903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T17:42:09Z","timestamp":1673113329000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621890.1621903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,16]]},"references-count":31,"alternative-id":["10.1145\/1621890.1621903","10.1145\/1621890"],"URL":"https:\/\/doi.org\/10.1145\/1621890.1621903","relation":{},"subject":[],"published":{"date-parts":[[2009,6,16]]},"assertion":[{"value":"2009-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}