{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:05:25Z","timestamp":1729609525633,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cscwd.2016.7566041","type":"proceedings-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T16:59:58Z","timestamp":1473958798000},"page":"504-508","source":"Crossref","is-referenced-by-count":0,"title":["A method of secure data transmission in WSN based on certificateless signature technology"],"prefix":"10.1109","author":[{"given":"Min","family":"Tu","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Diao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1422","article-title":"Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks[J]","author":"pang","year":"2008","journal-title":"Chinese Journal of Sensors and Actuators"},{"key":"ref11","article-title":"Based on Node ID Confirmation Defend DoS Attacks in Wireless Sensor Networks[J]","author":"zou","year":"2010","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref12","article-title":"Node Authentication and Security Detection of Wireless Sensor Network[D]","author":"huang","year":"2012","journal-title":"University of Science and Technology of China"},{"key":"ref13","first-page":"1842","article-title":"Node behavior and identity-based trusted authentication in wireless sensor networks[J]","author":"tao","year":"2013","journal-title":"Journal of Computer Applications"},{"key":"ref14","article-title":"Research on the Technique of Countering Malicious Nodes in Wireless Senor Networks[D]","author":"yang","year":"2009","journal-title":"University of Science and Technology of China"},{"key":"ref4","first-page":"19","article-title":"Security analysis of efficient certificateless signature scheme","volume":"47","author":"hu","year":"2011","journal-title":"Computer Engineering and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.06.011"},{"key":"ref6","first-page":"273","article-title":"Improved certificateless hybrid signcryption scheme[J]","volume":"1","author":"zhou","year":"2013","journal-title":"Application Research of Computers"},{"key":"ref5","first-page":"640","article-title":"Authentication scheme based on certificateless signcryption in proxy mobile IPv6 network[J]","volume":"2","author":"zhang","year":"2012","journal-title":"Application Research of Computers"},{"key":"ref8","first-page":"637","article-title":"A new certificateless broadcast signcryption[J]","volume":"5","author":"sun","year":"2011","journal-title":"Journal of Harbin Engineering University"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03825"},{"key":"ref2","article-title":"Security Weaknesses in Two Certificateless Signcryption Schemes[J]","volume":"92","author":"selvi","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.10.011"},{"key":"ref9","article-title":"Research on Broadcasting in Dense Wireless Senor Network with Irregular and Dynamic Radio Coverage[J]","author":"mao","year":"2010","journal-title":"Computer Research and Development ISTIC El PKU"}],"event":{"name":"2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2016,5,4]]},"location":"Nanchang, China","end":{"date-parts":[[2016,5,6]]}},"container-title":["2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7561991\/7565943\/07566041.pdf?arnumber=7566041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T07:43:47Z","timestamp":1475653427000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7566041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2016.7566041","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}