{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:59:44Z","timestamp":1729648784067,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/iccnc.2016.7440584","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:20:24Z","timestamp":1458836424000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Location-enhanced authenticated key exchange"],"prefix":"10.1109","author":[{"given":"Marcos","family":"Portnoi","sequence":"first","affiliation":[]},{"given":"Chien-Chung","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The SRP Authentication and Key Exchange System","author":"wu","year":"2000","journal-title":"IETF RFC 2945"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2753476.2753482"},{"article-title":"Specification of the Bluetooth System: Covered Core Package version 4.2","year":"2014","author":"bluetooth","key":"ref13"},{"key":"ref14","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"1998","journal-title":"IETF RFC 2401"},{"journal-title":"EMC Corporation","article-title":"PKCS #5 v2.1: Password-Based Cryptography Standard","year":"2012","key":"ref15"},{"key":"ref16","article-title":"HMAC-Based Extract-and-Expand Key Derivation Function (HKDF)","author":"krawczyk","year":"2010","journal-title":"IETF RFC 5869"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","article-title":"Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm","volume":"1976","author":"bellare","year":"2000","journal-title":"Advances in Cryptology ? ASIACRYPT 2000"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref19","article-title":"Photuris: Session-Key Management Protocol","author":"karn","year":"1999","journal-title":"IETF RFC 2522"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref6","article-title":"Internet Key Exchange Protocol Version 2 (IKEv2)","author":"kaufman","year":"2014","journal-title":"IETF RFC 7296"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","article-title":"Technical Guideline TR-03110-2, Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token - Part 2 - Protocols for electronic IDentification, Authentication and trust Srvices (eIDAS)","year":"2015","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996946"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069321"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"ref9","article-title":"Password Authenticated Connection Establishment with the Internet Key Exchange Protocol version 2 (IKEv2)","author":"kuegler","year":"2012","journal-title":"IETF RFC 6631"}],"event":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2016,2,15]]},"location":"Kauai, HI, USA","end":{"date-parts":[[2016,2,18]]}},"container-title":["2016 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7430154\/7440540\/7440584.pdf?arnumber=7440584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:16:19Z","timestamp":1498281379000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7440584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2016.7440584","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}