{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:56:58Z","timestamp":1729659418542,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,20]]},"DOI":"10.1109\/ai-csp52968.2021.9671225","type":"proceedings-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T20:45:13Z","timestamp":1641933913000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Secure Consensus Clock Synchronization in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Aissaoua","family":"Habib","sequence":"first","affiliation":[]},{"given":"Abdelkader","family":"Laouid","sequence":"additional","affiliation":[]},{"given":"Mostefa","family":"Kara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844143"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12767"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231079"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"380","DOI":"10.26555\/jiteki.v7i3.22210","article-title":"Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol","volume":"7","author":"kara","year":"2021","journal-title":"Jurnal Ilmiah Teknik Elektro Komputer dan Informatika"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app11156750"},{"key":"ref18","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"OSDI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2286102"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2006.010505"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941353"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TC.2006.25","article-title":"Global clock synchronization in sensor networks","volume":"55","author":"li","year":"2006","journal-title":"IEEE Transactions on Computers"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322318"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200555"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231091"},{"key":"ref7","first-page":"51","article-title":"Global clock synchronization in sensor networks","volume":"61","author":"rus","year":"2006","journal-title":"Papers on synchronization in sensor networks include"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-021-0002-y"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2491320"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982217"},{"key":"ref22","article-title":"Secure time synchronization for wireless sensor networks based on bilinear pairing functions","author":"rahman","year":"2010","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070343"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380571"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4108-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s18082718"}],"event":{"name":"2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)","start":{"date-parts":[[2021,11,20]]},"location":"El Oued, Algeria","end":{"date-parts":[[2021,11,21]]}},"container-title":["2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9670880\/9670890\/09671225.pdf?arnumber=9671225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,22]],"date-time":"2023-01-22T16:50:41Z","timestamp":1674406241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,20]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ai-csp52968.2021.9671225","relation":{},"subject":[],"published":{"date-parts":[[2021,11,20]]}}}