[{"data": {"name": "Guide to bluetooth security", "@type": "ScholarlyArticle", "genre": "report", "author": [{"name": "J Padgette", "@type": "Person"}, {"name": "K A Scarfone", "@type": "Person"}, {"name": "L Chen", "@type": "Person"}], "@context": "http://schema.org/", "encoding": [{"@type": "MediaObject", "contentUrl": "https://doi.org/10.6028/nist.sp.800-121r1", "encodingFormat": "application/pdf"}], "publisher": {"name": "National Institute of Standards and Technology", "@type": "Organization"}, "identifier": [{"@type": "PropertyValue", "value": "10.6028/nist.sp.800-121r1", "propertyID": "DOI"}, {"@type": "PropertyValue", "value": "CCTZREZzw9UYJ-CTjTtjp66zYjE-CDXKnLERf4dHx-CR9BBMA1oLXss", "propertyID": "ISCC"}], "datePublished": "2012-01-01"}, "schema": "schema.org", "mediatype": "application/ld+json"}]