{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:07:06Z","timestamp":1729663626332,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750163","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"65-69","source":"Crossref","is-referenced-by-count":1,"title":["Securing E-Seal real time tracking system for Internet of Things"],"prefix":"10.1109","author":[{"given":"Mouza Ahmed Bani","family":"Shemaili","sequence":"first","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]},{"given":"Mohamed Jamal","family":"Zemerly","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Mubarak","sequence":"additional","affiliation":[]},{"family":"Yoon Seok Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2010.037402"},{"key":"17","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Proceedings of CRYPTO 2001"},{"journal-title":"Elliptic Curves Number Theory and Cryptography","year":"2007","author":"washington","key":"18"},{"journal-title":"RFID Journal","article-title":"Active e-Seals expedite cargo shipments in taiwan","year":"0","key":"15"},{"key":"16","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proceedings of Crypto' 84"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2267735"},{"key":"14","first-page":"94","article-title":"Incorporating scenic view, slope, and crime rates into route choices emphasis on 3-D gIS with digital elevation Models and Crime Rate Geospatial Data","author":"byon","year":"2011","journal-title":"Transportation Research Record Journal of the Transportation Research Board"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/15472450903287781"},{"journal-title":"TrafficPulse A Mobile GISystem for Transportation MobiGIS 2012 ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems","year":"2012","author":"li","key":"12"},{"key":"3","article-title":"A cipher desgin for low computation device","author":"shemaili","year":"2012","journal-title":"Proceeding of the International Conference on Advanced IT Engineering and Management (AIM'12)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0470112255"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2013.824762"},{"key":"7","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","article-title":"Pulic key encryption with keyword search revisted","volume":"5072","author":"baek","year":"2008","journal-title":"Computational Science and Its Applications-ICCSA 2008 Proceedings LNSC"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_20"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0109-y"},{"key":"4","first-page":"87","article-title":"A new lightweight hybrid cryptographic algorithm for the internet of things","author":"shemaili","year":"2012","journal-title":"Proceeding of the International Conference for Internet Technology and Secured Transactions (ICITST'12) in Conjunction with the International Workshop on RFID Security and Cryptography (RISC'12)"},{"key":"9","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/978-3-540-24646-6_19","article-title":"ESeal-A system for enhanced electronic assertion of authenticity and integrity","author":"decker","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"8","article-title":"Smart container security\\-The e-seal with rFID technology","volume":"2","author":"zhang","year":"2008","journal-title":"International Journal on Marine Navigation and Safety of Sea Transportation"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750163.pdf?arnumber=6750163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:40Z","timestamp":1498112860000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750163","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}