{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:30:14Z","timestamp":1725474614398},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540499329"},{"type":"electronic","value":"9783540499336"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11943952_42","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T19:01:12Z","timestamp":1164654072000},"page":"497-508","source":"Crossref","is-referenced-by-count":4,"title":["Key Exchange in 802.15.4 Networks and Its Performance Implications"],"prefix":"10.1007","author":[{"given":"Moazzam","family":"Khan","sequence":"first","affiliation":[]},{"given":"Fereshteh","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std. 802.15.4, IEEE (2003)"},{"key":"42_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Upper Saddle River (2003)"},{"key":"42_CR3","unstructured":"ZigBee specification (ZigBee document 053474r06, version 1.0). ZigBee Alliance (2004)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: WiSe 2004: Proceedings of the 2004 ACM workshop on Wireless security, pp. 32\u201342 (2004)","DOI":"10.1145\/1023646.1023654"},{"key":"42_CR5","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Computer and System Sciences\u00a061, 362\u2013399 (2000)","journal-title":"Computer and System Sciences"},{"key":"42_CR6","unstructured":"Whiting, D., Housley, R., Ferguson, N.: Counter with cbc-mac (CCM) (2003), \n                    \n                      http:\/\/www.rfc-archive.org\/getrfc.php?rfc=3610"},{"key":"42_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"42_CR8","unstructured":"FIPS Pub 198, The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce\/N.I.S.T. (2002)"},{"key":"42_CR9","unstructured":"ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry- Key Agreement and Key Transport Using Elliptic Curve Cryptography. American Bankers Association (2001)"},{"key":"42_CR10","unstructured":"RSoft Design Inc.: Artifex v.4.4.2 (2003)"},{"key":"42_CR11","unstructured":"Shafi, S.: Performance of a beacon enabled IEEE 802.15.4-compliant network. Master\u2019s thesis, Department of Computer Science, University of Manitoba, Winnipeg, Canada (2005)"},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPDS.2006.9","volume":"17","author":"J. Mi\u0161i\u0107","year":"2006","unstructured":"Mi\u0161i\u0107, J., Shafi, S., Mi\u0161i\u0107, V.B.: Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems\u00a017, 1\u201316 (2006)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Lecture Notes in Computer Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11943952_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:52:04Z","timestamp":1619509924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11943952_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540499329","9783540499336"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11943952_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}