{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:14Z","timestamp":1761648194756,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocom.2013.6831320","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T22:05:38Z","timestamp":1403301938000},"page":"1711-1716","source":"Crossref","is-referenced-by-count":5,"title":["Performance evaluation of an enhanced cryptography solution for m-Health applications in cooperative environments"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Canelo","sequence":"first","affiliation":[]},{"given":"Bruno M. C.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"family":"Zuqing Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2008.4751269"},{"key":"16","first-page":"727","article-title":"Symmetric key management and distribution techniques in wireless ad hoc networks","author":"krishna","year":"2011","journal-title":"International Conference on Computational Intelligence and Communication Networks (CICN)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2008.4493935"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PCTHEALTH.2006.361689"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134704"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4018\/jehmc.2010040102"},{"key":"3","first-page":"367","article-title":"Application of session initiation protocol in mobile health systems","author":"cubic","year":"2010","journal-title":"MIPRO 2010 Proceedings of the 33rd International Convention"},{"key":"2","first-page":"94","article-title":"MHealth-an ultimate platform to serve the unserved","author":"akter","year":"2010","journal-title":"IMIA Yearbook of Medical Informatics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1089\/153056203322502632"},{"year":"2013","key":"10"},{"key":"7","article-title":"A data encryption solution for mobile health applications in cooperation environments: DE4MHA","volume":"15","author":"silva","year":"2013","journal-title":"Journal of Medical Internet Research (JMIR)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"journal-title":"Cooperative Communications (Foundations and Trends in Networking)","year":"2007","author":"kramer","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3109\/17538157.2012.674586"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2011.6026782"}],"event":{"name":"2013 IEEE Global Communications Conference (GLOBECOM 2013)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6821297\/6831034\/06831320.pdf?arnumber=6831320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:53:18Z","timestamp":1490287998000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6831320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocom.2013.6831320","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}