{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:49:32Z","timestamp":1760042972520},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,5,16]],"date-time":"2006-05-16T00:00:00Z","timestamp":1147737600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2006,6,30]]},"DOI":"10.1007\/s11277-006-9044-7","type":"journal-article","created":{"date-parts":[[2006,5,15]],"date-time":"2006-05-15T08:59:28Z","timestamp":1147683568000},"page":"455-469","source":"Crossref","is-referenced-by-count":40,"title":["Security Framework for Wireless Sensor Networks"],"prefix":"10.1007","volume":"37","author":[{"given":"Neeli R.","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Mahbubul","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,16]]},"reference":[{"key":"9044_CR1","unstructured":"N. Prasad, Adaptive Security for Heterogeneous Networks, Ph.D. Thesis, 2004."},{"key":"9044_CR2","doi-asserted-by":"crossref","unstructured":"S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, \u201cA Security Architecture for Mobile Wireless Sensor Networks\u201d, Security in Ad-hoc and Sensor Networks: First European Workshop (ESAS 2004) Heidelberg, Germany, August 6, 2004.","DOI":"10.1007\/978-3-540-30496-8_14"},{"key":"9044_CR3","doi-asserted-by":"crossref","unstructured":"Ed Callaway et al., \u201cHome Networking with 802.15.4: A Developing Standard for Low-Rate Wireless Personal Area Networks\u201d, IEEE Communication Magazine, August 2002.","DOI":"10.1109\/MCOM.2002.1024418"},{"issue":"8","key":"9044_CR4","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"F. Akyildiz","year":"August 2002","unstructured":"F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, \u201cA Survey on Sensor Networks,\u201d IEEE Communications Magazine, Vol. 40, No. 8, pp. 102\u2013114, August 2002.","journal-title":"IEEE Communications Magazine"},{"key":"9044_CR5","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E Culler, \u201cSPINS: Security Protocols for Sensors Networks\u201d, Wireless Networks 8, Kluwer Academic Publishers, pp. 521\u2013534, 2002.","DOI":"10.1023\/A:1016598314198"},{"issue":"5","key":"9044_CR6","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G. Frey","year":"1999","unstructured":"G. Frey and H.G. Ruck, \u201cThe Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems\u201d, IEEE Trans. Inform. Theory, Vol. 45, No. 5, 1717\u20131719, 1999.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9044_CR7","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"N.P. Smart, \u201cAn Identity Based Authenticated key Agreement Protocol Based on the Weil Pairing\u201d, Electronics Letters, Vol. 38, pp. 630\u2013632, 2002.","journal-title":"Electronics Letters"},{"key":"9044_CR8","unstructured":"L. Chen and C. Kudla \u201cIdentity Based Authenticated Key Agreement Protocols from Pairings\u201d, HP Laboratories, Bristol, February 12th, 2003."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-006-9044-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-006-9044-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-006-9044-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:04:18Z","timestamp":1559394258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-006-9044-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5,16]]},"references-count":8,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,6,30]]}},"alternative-id":["9044"],"URL":"https:\/\/doi.org\/10.1007\/s11277-006-9044-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5,16]]}}}