{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:30:35Z","timestamp":1754397035893,"version":"3.37.3"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100007053","name":"Korea Institute of Energy Technology Evaluation and Planning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007053","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Trade, Industry, and Energy South Korea","award":["20161520302230"],"award-info":[{"award-number":["20161520302230"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2809614","type":"journal-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T17:47:17Z","timestamp":1520876837000},"page":"16539-16548","source":"Crossref","is-referenced-by-count":5,"title":["Secure Authentication and Four-Way Handshake Scheme for Protected Individual Communication in Public Wi-Fi Networks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7370-7849","authenticated-orcid":false,"given":"Jaewon","family":"Noh","sequence":"first","affiliation":[]},{"given":"Jeehyeong","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1847-6088","authenticated-orcid":false,"given":"Sunghyun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2015.7432975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Asia.2016.7804782"},{"key":"ref12","first-page":"720","article-title":"Performance based comparison study of RSA and elliptic curve cryptography","volume":"4","author":"sinha","year":"2013","journal-title":"Int J Sci Eng Res"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-1-4419-5906-5_509","article-title":"Hardware security module","author":"sustek","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref14","first-page":"1904","article-title":"Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz&#x2019;s method","volume":"2","author":"padma","year":"2010","journal-title":"Int J Comput Sci Eng"},{"key":"ref15","first-page":"90","article-title":"Security analysis and improvements for IEEE 802.11i","author":"mitchell","year":"2005","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2657649"},{"key":"ref18","first-page":"3708","article-title":"Study and implementation of elliptic curve encryption algorithm for azerbaijan E-ID card","volume":"3","author":"arif","year":"2015","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2007.350770"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1386853.1378356"},{"journal-title":"Elliptic Curve Cryptography","year":"2017","author":"anoop","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEE.2015.7506822"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6178212"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14257\/ijfgcn.2015.8.1.02"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2400443"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2004.94585"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2015.7507110"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503286"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08314146.pdf?arnumber=8314146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:38:57Z","timestamp":1641987537000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8314146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2809614","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}