{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:06:59Z","timestamp":1748668019674,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ccst.2014.6987046","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T00:57:56Z","timestamp":1419987476000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Partial crypto-reconfiguration of nodes based on FPGA for WSN"],"prefix":"10.1109","author":[{"given":"L.A.","family":"Cardona","sequence":"first","affiliation":[]},{"given":"B.","family":"Lorente","sequence":"additional","affiliation":[]},{"given":"C.","family":"Ferrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SILICA Xynergy-M4 Board","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2007.04.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IDT.2013.6727108"},{"journal-title":"Opencores","year":"2014","key":"ref6"},{"journal-title":"Numonyx M25P128 serial Flash memory","year":"2014","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2013.6922070"},{"journal-title":"Xilinx","article-title":"Partial Reconfiguration User Guide UG702 (v14.3)","year":"2012","key":"ref8"},{"key":"ref7","article-title":"Incorporated","author":"koch","year":"2012","journal-title":"Partial Reconfiguration on FPGAs Architectures Tools and Applications"},{"key":"ref2","first-page":"217","article-title":"Rh-mote for next-generation wireless sensor networks Procedia Computer Science","volume":"21","author":"elkateeb","year":"2013","journal-title":"The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763244"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015052"}],"event":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2014,10,13]]},"location":"Rome, Italy","end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6961037\/6986962\/06987046.pdf?arnumber=6987046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:04:50Z","timestamp":1490313890000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6987046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ccst.2014.6987046","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}