{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:33Z","timestamp":1730209893786,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/comsnets.2014.6734924","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T16:08:18Z","timestamp":1392307698000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["Implementation of ECC with hidden Generator point in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Ravi Kishore","family":"Kodali","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2010.51"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2012.6164416"},{"key":"12","first-page":"2011","article-title":"Efficiently fuzzy controlling with dynamic window in elliptic curve cryptography sensor networks","volume":"1","author":"huang","year":"0","journal-title":"Proceeding of the International MultiConference of Engineers and Computer Scientists"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"journal-title":"MICAz Wireless Measurement System","year":"2004","author":"inc","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"journal-title":"Scalar Multiplication on Elliptic Curves","year":"2006","author":"yayla","key":"10"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.15"},{"key":"5","first-page":"925","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","volume":"2004","author":"gura","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.1993.378085"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2013.6466286"},{"journal-title":"Software Implementation of the NIST Elliptic Curves Over Prime Fields","year":"2001","author":"brown","key":"8"}],"event":{"name":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2014,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2014,1,10]]}},"container-title":["2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720258\/6734849\/06734924.pdf?arnumber=6734924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:42:00Z","timestamp":1490298120000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6734924\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2014.6734924","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}