{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:02:49Z","timestamp":1747890169632,"version":"3.41.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccsce.2014.7072773","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T15:53:17Z","timestamp":1428076397000},"page":"518-523","source":"Crossref","is-referenced-by-count":4,"title":["RF simulator for cryptographic protocol"],"prefix":"10.1109","author":[{"given":"Mohd Anuar Mat","family":"Isa","sequence":"first","affiliation":[]},{"given":"Habibah","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Jamalul-lail Ab","family":"Manan","sequence":"additional","affiliation":[]},{"given":"Syed Farid Syed","family":"Adnan","sequence":"additional","affiliation":[]},{"given":"Ramlan","family":"Mahmod","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2007","author":"chen","article-title":"Simplex Stop and Wait with ARQ","key":"ref10"},{"key":"ref11","article-title":"Diffie-Hellman Key Agreement Method (RFC 2631)","author":"rescorla","year":"1999","journal-title":"The Internet Society"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICICIC.2009.80"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1167350.1167432"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SECCOM.2007.4550299"},{"key":"ref15","first-page":"61","article-title":"Analysis of Stop-and-Wait ARQ for a wireless channel","volume":"7","author":"de vuyst","year":"2008"},{"key":"ref16","article-title":"Software Visualization for Teaching Network Protocols","author":"lahdenm\u00e4ki","year":"2010","journal-title":"Aalto University"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1868630.1868633"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/LANMAN.2011.6076934"},{"key":"ref19","article-title":"SimEvents-based modeling and simulation study of Stop-and-Wait protocol","author":"alsebae","year":"2013","journal-title":"in 2013 Proceedings of International Conference on Modelling Identification & Control (ICMIC)"},{"key":"ref4","article-title":"An Experimental study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices","author":"mat isa","year":"2014","journal-title":"in Lecture Notes in Engineering and Computer Science Proceedings of The World Congress on Engineering 2014 (WCE 2014)"},{"key":"ref3","article-title":"A Secure TFTP Protocol with Security Proofs","volume":"1","author":"mat isa","year":"2014","journal-title":"in Lecture Notes in Engineering and Computer Science Proceedings of The World Congress on Engineering 2014 (WCE 2014)"},{"key":"ref6","first-page":"1","article-title":"TFTP Option Extension (RFC 2347)","author":"malkin","year":"1998","journal-title":"The Internet Society"},{"year":"2014","journal-title":"Premier Farnell UK Limited","article-title":"CISECO - B023 - SLICE OF RADIO, RASPI RF BOARD","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Advice to link designers on link Automatic Repeat reQuest (ARQ)","author":"fairhurst","year":"2002","journal-title":"RFC 3366"},{"key":"ref7","first-page":"1","article-title":"THE TFTP PROTOCOL (REVISION 2) RFC 1350","author":"sollins","year":"1992","journal-title":"IAB Official Protocol Standards"},{"key":"ref2","article-title":"A Lightweight and Secure TFTP Protocol in the Embedded System","author":"mat isa","year":"2012","journal-title":"in 2012 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE 2012)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/CIMCA.2008.170"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref20","article-title":"Security Verification Simulator for Fault Analysis Attacks","volume":"3","author":"yoshikawa","year":"2013","journal-title":"JSCSE International Journal of Soft Computing and Software Engineering"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1080\/00031305.1980.10483034","article-title":"Comparative Analyses of Pretest-Posttest Research Designs","volume":"34","author":"brogan","year":"1980","journal-title":"Am Stat"},{"year":"2014","journal-title":"DENX Software Engineering","article-title":"DENX U-Boot","key":"ref21"},{"year":"2014","journal-title":"The Raspberry Pi Foundation","article-title":"Raspberry Pi","key":"ref24"},{"key":"ref23","article-title":"Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System","author":"mat isa","year":"2012","journal-title":"in International Symposium on Advances in Trusted and Secure Information Systems (TSIS-2012)"}],"event":{"name":"2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","start":{"date-parts":[[2014,11,28]]},"location":"Penang, Malaysia","end":{"date-parts":[[2014,11,30]]}},"container-title":["2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7063839\/7072673\/07072773.pdf?arnumber=7072773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T21:39:28Z","timestamp":1747863568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7072773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccsce.2014.7072773","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}