{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T01:59:51Z","timestamp":1776995991769,"version":"3.51.4"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225644","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:38Z","timestamp":1602792038000},"page":"1-7","source":"Crossref","is-referenced-by-count":14,"title":["An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices"],"prefix":"10.1109","author":[{"given":"Barnana","family":"Baruah","sequence":"first","affiliation":[]},{"given":"Subhasish","family":"Dhal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7389804"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"ref12","article-title":"Identity-Based Cryptosystems and Signature Schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology CRYPTO 1984 Lecture Notes in Computer Science"},{"key":"ref13","article-title":"Public Key Cryptography","volume":"1431","author":"imai","year":"0","journal-title":"Proceedings of First International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2016.2630729"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2673239"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2716953"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2016.7482039"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1201\/9781420068405"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884906"},{"key":"ref27","year":"0","journal-title":"Multiprecision Integer and Rational Arithmetic C\/c++ library"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902563"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398359"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903242"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2378592"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/26.141416"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/el:20057114"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/JIOT.2017.2737630","article-title":"A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment","volume":"6","author":"alireza","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865212"},{"key":"ref21","first-page":"1","article-title":"A multiattack resilient lightweight IoT authentication scheme","author":"adeel","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"ref24","article-title":"Analysing Security Protocols with AVISPA","author":"takkinen","year":"2006","journal-title":"TKK T-110 7290 Research Seminar on Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref25","author":"stinson","year":"1995","journal-title":"Cryptography Theory and Practice"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2020,7,1]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225644.pdf?arnumber=9225644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:09Z","timestamp":1656375789000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225644","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}