{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:05:06Z","timestamp":1747159506378,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364977","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:17:44Z","timestamp":1354580264000},"page":"6183-6187","source":"Crossref","is-referenced-by-count":16,"title":["Security in nano communication: Challenges and open research issues"],"prefix":"10.1109","author":[{"given":"Falko","family":"Dressler","sequence":"first","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"344","article-title":"Distance-bounding protocols","author":"brands","year":"1993","journal-title":"EUROCRYPT 1993"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278669"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5473874"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"13","first-page":"586","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"IEEE INFOCOM 2004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.260"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"12","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NANO.2003.1231816"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.024"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.001"},{"key":"10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","article-title":"A survey of security issues in mobile ad hoc and sensor networks","volume":"7","author":"djenouri","year":"2005","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.53"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2012.6152227"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1021\/nl0721113"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2008.08.061"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100510"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100509"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364977.pdf?arnumber=6364977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:35:22Z","timestamp":1498001722000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364977","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}