{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:13:51Z","timestamp":1747808031295,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647207","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T18:34:06Z","timestamp":1550774046000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack"],"prefix":"10.1109","author":[{"given":"Taha","family":"Belkhouja","sequence":"first","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Abdulla K.","family":"Al-Ali","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2434","DOI":"10.1016\/j.adhoc.2006.05.012","article-title":"An Effective Key Management Scheme for Heterogeneous Sensor Networks","volume":"5","author":"du","year":"2007","journal-title":"Ad Hoc Networks"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A Survey of Key Management Schemes in Wireless Sensor Networks","volume":"30","author":"xiao","year":"2007","journal-title":"Journal of Computer Communications"},{"key":"ref13","first-page":"23","volume":"379","author":"cheng","year":"2017","journal-title":"A lightweight live memory forensic approach based on hardware virtualization"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567115"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766089"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","article-title":"Security in Wireless Sensor Networks","volume":"15","author":"du","year":"2008","journal-title":"IEEE Wireless Communications Magazine"},{"key":"ref18","article-title":"Analyzing Permutations for AES-like Ciphers: Understanding Shift Rows","author":"beierle","year":"2015","journal-title":"Topics in Cryptology - CT-RSA"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref19"},{"key":"ref4","article-title":"Unmasking a modulated chaotic communications scheme","author":"short","year":"1995","journal-title":"Int J Bifurcations Chaos"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857746"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(94)00903-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(95)00603-Z"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7020021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.22"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF01608556"},{"key":"ref22","article-title":"Dynamical Properties of the Hnon Mapping","volume":"6","author":"al-shameri","year":"2012","journal-title":"Int Journal of Math Analysis"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402005121"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","article-title":"National Institute of Standards and Technology","year":"2010","key":"ref24"},{"journal-title":"A Classical Introduction to Cryptography","year":"2005","author":"vaudenay","key":"ref23"},{"journal-title":"ISim User Guide","year":"2012","key":"ref26"},{"journal-title":"Xilinx Spartan-6 Family Overview","year":"2011","key":"ref25"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647207.pdf?arnumber=8647207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:19:50Z","timestamp":1643249990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647207","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}