{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:36:37Z","timestamp":1729622197070,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/iccchina.2016.7636868","type":"proceedings-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T16:23:33Z","timestamp":1477326213000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Device-invisible two-factor authenticated key agreement protocol for BYOD"],"prefix":"10.1109","author":[{"given":"Jianbing","family":"Ni","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xuemin Sherman","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"123","article-title":"2TAC: Distributed access control architecture for &#x201C;bing your own device&#x201D; security","author":"chung","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480707"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15087-1_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2493983"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911814"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref17","first-page":"156","article-title":"Provably secure password-authentication key exchange using Diffie-Hellman","volume":"1807","author":"boyko","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511196"},{"key":"ref4","article-title":"Bring your own device agility through consistent delivery","author":"edelheit","year":"2012","journal-title":"PWC"},{"key":"ref3","article-title":"The technocracy is over-innovation is here, plan your security accordingly","author":"contos","year":"2015","journal-title":"CSO Network Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.011"},{"key":"ref5","first-page":"37","article-title":"T-dominance: Prioritized defense deployment for BYOD security","author":"peng","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627410"},{"key":"ref7","article-title":"Key strategies to capture and measure the value of con-sumerization of IT","author":"micro","year":"2012","journal-title":"Bitpipe"},{"key":"ref2","article-title":"BYOD: (Bring your own device) is your organization ready?","author":"cavoukian","year":"2013","journal-title":"Telus"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70031-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2484858"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2519819"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1109\/TWC.2008.060990","article-title":"TUA: A novel compromise-resilient authentication architecture for wireless mess networks","volume":"7","author":"lin","year":"2008","journal-title":"IEEE Trans Wirel Commun"}],"event":{"name":"2016 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2016,7,27]]},"location":"Chengdu, China","end":{"date-parts":[[2016,7,29]]}},"container-title":["2016 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592393\/7636714\/07636868.pdf?arnumber=7636868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:59:10Z","timestamp":1498341550000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7636868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2016.7636868","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}