{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:16:48Z","timestamp":1758845808812},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1007\/s11390-008-9140-0","type":"journal-article","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T19:44:14Z","timestamp":1212176654000},"page":"377-388","source":"Crossref","is-referenced-by-count":4,"title":["Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange"],"prefix":"10.1007","volume":"23","author":[{"given":"Fereshteh","family":"Amini","sequence":"first","affiliation":[]},{"given":"Moazzam","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Pourreza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,6,2]]},"reference":[{"issue":"4","key":"9140_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPDS.2006.54","volume":"17","author":"J Mi\u0161i\u0107","year":"2006","unstructured":"Mi\u0161i\u0107 J, Shafi S, Mi\u0161i\u0107 V B. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems, April 2006, 17(4): 1\u201316.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9140_CR2","unstructured":"Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std 802.15.4, IEEE, New York, 2003."},{"key":"9140_CR3","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2003","unstructured":"Stallings W. Cryptography and Network Security: Principles and Practice. Upper Saddle River: Prentice Hall, 2003."},{"key":"9140_CR4","unstructured":"ZigBee Specification. ZigBee Document 053474r06, Version 1.0. ZigBee Alliance. December 2004."},{"key":"9140_CR5","doi-asserted-by":"crossref","unstructured":"Sastry N, Wagner D. Security considerations for IEEE 802.15.4 networks. In Proc. the 2004 ACM Workshop on Wireless Security (WiSe\u201904), 2004, pp.32\u201342.","DOI":"10.1145\/1023646.1023654"},{"issue":"3","key":"9140_CR6","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M Bellare","year":"2000","unstructured":"Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Computer and System Sciences, 2000, 61(3): 362\u2013399.","journal-title":"Computer and System Sciences"},{"key":"9140_CR7","doi-asserted-by":"crossref","unstructured":"Whiting D, Housley R, Ferguson N. Counter with cbc-mac (CCM). 2003, http:\/\/www.rfc-archive.org\/ge-trfc.php?rfc=3610 .","DOI":"10.17487\/rfc3610"},{"key":"9140_CR8","unstructured":"Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"9140_CR9","unstructured":"FIPS Pub 198. The keyed-hash message authentication code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce\/N.I.S.T., Springfield, Virginia, 2002."},{"key":"9140_CR10","unstructured":"ANSI X9.63\u20132001. Public key cryptography for the financial services industry-key agreement and key transport using elliptic curve cryptography. American Bankers Association, 2001."},{"key":"9140_CR11","doi-asserted-by":"crossref","unstructured":"Weichao Wang, Bharat Bhargava. Key distribution and up-date for secure inter-group multicast communication. In Proc the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN\u201905), New York: ACM Press, NY, USA, 2005, pp.43\u201352.","DOI":"10.1145\/1102219.1102227"},{"issue":"6","key":"9140_CR12","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/TNET.2003.820256","volume":"11","author":"X Brian Zhang","year":"2003","unstructured":"X Brian Zhang, Simon S Lam, Dong-Young Lee, Y Richard Yang. Protocol design for scalable and reliable group rekeying. IEEE\/ACM Trans. Netw., 2003, 11(6): 908\u2013922.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9140_CR13","volume-title":"Handbook of Sensor Networks: Algorithms and Architectures","year":"2005","unstructured":"Ivan Stojmenovi\u0107 (ed.). Handbook of Sensor Networks: Algorithms and Architectures. New York: John Wiley & Sons, NY, 2005."},{"key":"9140_CR14","doi-asserted-by":"crossref","unstructured":"Sankarasubramaniam Yogesh. Akan \u00d6zg\u00fcr B, Akyildiz Ian F. ESRT: Event-to-sink reliable transport in wireless sensor networks. In Proc. 4th ACM MobiHoc, Annapolis, MD, June 2003, pp.177\u2013188.","DOI":"10.1145\/778415.778437"},{"key":"9140_CR15","unstructured":"RSoft Design Inc. Artifex v.4.4.2, San Jose, CA, 2003."},{"key":"9140_CR16","unstructured":"Shafi S. Performance of a beacon enabled IEEE 802.15.4-compliant network [Thesis]. Department of Computer Science, University of Manitoba, Winnipeg, Canada, 2005."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9140-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-008-9140-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9140-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:32:40Z","timestamp":1559399560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-008-9140-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,5]]}},"alternative-id":["9140"],"URL":"https:\/\/doi.org\/10.1007\/s11390-008-9140-0","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5]]}}}