{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:21:41Z","timestamp":1725528101313},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/fruct.2014.6872432","type":"proceedings-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T21:08:33Z","timestamp":1408396113000},"page":"46-51","source":"Crossref","is-referenced-by-count":0,"title":["Secure lightweight protocols for medical device monitoring"],"prefix":"10.1109","author":[{"given":"Andrei","family":"Gurtov","sequence":"first","affiliation":[]},{"given":"Pawani","family":"Porambage","sequence":"additional","affiliation":[]},{"given":"Ilya","family":"Nikolaevskiy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1366919.1366925"},{"key":"14","article-title":"BLIND: A complete identity protection framework for end-points","author":"ylitalo","year":"2004","journal-title":"Proceedings of the Twelfth International"},{"key":"11","article-title":"Using HIP DEX for key management and access control in smart objects","author":"gurtov","year":"2012","journal-title":"Workshop on Smart Object Security"},{"key":"12","article-title":"Securing medical sensor network with HIP","author":"kuptsov","year":"2011","journal-title":"Proc 2nd Int ICST Conf Wireless Mobile Commun Healthcare (MobiHealth 2011)"},{"journal-title":"BAN and Diabetes A Template for Medical Device Communication","year":"2009","author":"wilson","key":"3"},{"key":"2","article-title":"Wireless health initiatives and body area networks: Physical layer and mac characteristics","author":"tomcik","year":"2009","journal-title":"Qualcomm Corporate Research and Development"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772898"},{"journal-title":"Part 15 4 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)","year":"2006","key":"7"},{"key":"6","article-title":"Progress with HIP and Future efforts","author":"moskowitz","year":"2009","journal-title":"HIP Research Group Meeting"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/11506157_40","article-title":"Analysis of the HIP base exchange protocol","author":"aura","year":"2005","journal-title":"Proc of the 10th Australasian Conference on Information Security and Privacy (ACISP)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"year":"0","key":"9"},{"key":"8","article-title":"Distributed authentication architecture in Wireless LANs","author":"kuptsov","year":"2009","journal-title":"Proceedings of IEEE Int Symp on a World of Wireless Mobile and Multimedia Networks (WoWMoM"}],"event":{"name":"2014 15th Conference of Open Innovations Association FRUCT and 3rd Regional Seminar on e-Tourism (FRUCT)","start":{"date-parts":[[2014,4,21]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2014,4,25]]}},"container-title":["Proceedings of 15th Conference of Open Innovations Association FRUCT"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6862737\/6872417\/06872432.pdf?arnumber=6872432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:54:17Z","timestamp":1498157657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6872432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fruct.2014.6872432","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}