{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:35:08Z","timestamp":1725395708832},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417118","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["LMAC: A Lightweight Message Authentication Code for Wireless Sensor Network"],"prefix":"10.1109","author":[{"given":"Amrita Roy","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Sipra","family":"DasBit","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Atmel AVR8-bit Microcontroller ATmega 128 processor datasheet","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4418","article-title":"UMAC: Message Authentication Code using Universal Hashing","author":"krovetz","year":"2006"},{"article-title":"VMAC: Message Authentication Code using Universal Hashing","year":"2007","author":"krovetz","key":"ref12"},{"key":"ref13","first-page":"137","article-title":"OMAC: One-Key CBC MAC","author":"iwata","year":"2002","journal-title":"Pre-proc of Fast Software Encryption FSE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0393-0"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2104","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653664"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.200"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.190"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381924"},{"journal-title":"Handbook of applied cryptography CRC Boca Raton FL","year":"1997","author":"menezes","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.453"},{"journal-title":"Cryptographic Key Length Recommendation BlueKrypt","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5340992"},{"key":"ref9","article-title":"Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication","author":"dworkin","year":"2005","journal-title":"NIST Special Publication"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:57:11Z","timestamp":1602687431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417118","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}