{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:35Z","timestamp":1730209055076,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/coginf.2011.6016171","type":"proceedings-article","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T14:40:43Z","timestamp":1316529643000},"page":"392-396","source":"Crossref","is-referenced-by-count":10,"title":["Cryptanalysis of robust mutual authentication protocol for wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Eun-Jun","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/GLOCOM.2007.190"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/SUTC.2006.1636182"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/TWC.2008.080128"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/1031495.1031515"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/1029102.1029113"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1023646.1023654"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1023\/A:1016598314198"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.csi.2004.06.001"},{"key":"12","first-page":"137","article-title":"The advanced encryption standard","volume":"26","author":"daemen","year":"2001","journal-title":"Dr Dobb's Journal"},{"year":"1997","author":"menezes","journal-title":"Handbook of Applied Cryptography","key":"21"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.chaos.2006.05.061"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.4218\/etrij.10.1510.0134"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1016\/j.csi.2006.01.002"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/JPROC.2003.814918"},{"key":"10","first-page":"77","article-title":"A simple attack on a recently introduced hash-based strong-password authentication scheme","volume":"1","author":"kim","year":"2005","journal-title":"International Journal of Security and Networks"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/s11859-010-0318-2"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1016\/j.jnca.2009.08.001"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.csi.2004.03.003"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1049\/el:20020380"},{"key":"9","first-page":"61","article-title":"Authenticated encryption schemes: Current status and key issues","volume":"1","author":"hwang","year":"2005","journal-title":"International Journal of Security and Networks"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/IAS.2009.17"}],"event":{"name":"Cognitive Computing (ICCI-CC)","start":{"date-parts":[[2011,8,18]]},"location":"Banff, AB, Canada","end":{"date-parts":[[2011,8,20]]}},"container-title":["IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005105\/6016112\/06016171.pdf?arnumber=6016171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:29:00Z","timestamp":1490077740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6016171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/coginf.2011.6016171","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}