{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T13:59:30Z","timestamp":1761487170170},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icecc.2004.1269564","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"149-154","source":"Crossref","is-referenced-by-count":1,"title":["SDL specification of a security architecture for WorldFIP"],"prefix":"10.1109","author":[{"given":"M.L.","family":"Chavez","sequence":"first","affiliation":[]},{"given":"F.R.","family":"Henriquez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Cryptography in heavily constraint environments","author":"paar","year":"2002","journal-title":"Proceedings of the First Ad-hoc Workshop"},{"journal-title":"Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2 Security Architecture","year":"1989","key":"2"},{"journal-title":"Specification and Description Language (SDL)","year":"2000","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1367-5788(98)00003-0"},{"key":"7","article-title":"A stream cipher Encryption algorithm Arcfour","author":"kaukonen","year":"1999","journal-title":"IETF"},{"journal-title":"WorldFIP General Purpose Field Communication System","year":"1995","key":"6"},{"key":"5","article-title":"Real time cryptoanalysis of a5\/1 on a PC","author":"biryukov","year":"2000","journal-title":"Fast Software Encryption Workshop"},{"key":"4","article-title":"Low cost RFID and the electronic product code","author":"sarma","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002 Lecture Notes in Computer Science"},{"journal-title":"Introduction to Cryptography With Coding Theory","year":"2002","author":"trappe","key":"9"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(95)00124-7"}],"event":{"name":"14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004.","start":{"date-parts":[[2004,2,18]]},"location":"Veracruz, Mexico","end":{"date-parts":[[2004,2,18]]}},"container-title":["14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8958\/28388\/01269564.pdf?arnumber=1269564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:08:54Z","timestamp":1489439334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1269564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icecc.2004.1269564","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}