{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:56:27Z","timestamp":1725634587061},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icufn.2018.8436968","type":"proceedings-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T22:04:56Z","timestamp":1534457096000},"page":"493-496","source":"Crossref","is-referenced-by-count":1,"title":["Session Key Agreement for End-to-End Security in Time-Synchronized Networks"],"prefix":"10.1109","author":[{"given":"Qinghua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dawit","family":"Mengistu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HMAC Keyed-Hashing for Message Authentication","year":"0","key":"ref10"},{"journal-title":"Computer Security Principles and Practice","year":"2015","author":"stallings","key":"ref11"},{"journal-title":"Advanced Encryption Standard (AES)","year":"2001","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2016.07.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2549008"},{"key":"ref15","first-page":"259","author":"ferguson","year":"2010","journal-title":"Cryptography Engineering Design Principles and Practical Applications"},{"journal-title":"Bluetooth","year":"0","key":"ref4"},{"journal-title":"ZigBee","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"Network Time Protocol","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"year":"0","key":"ref7"},{"journal-title":"Internet of Things - Architecture","year":"2018","author":"lea","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5772\/13225"},{"journal-title":"Matlab","year":"0","key":"ref9"}],"event":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2018,7,3]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2018,7,6]]}},"container-title":["2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8417133\/8436587\/08436968.pdf?arnumber=8436968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:35:23Z","timestamp":1643204123000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8436968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icufn.2018.8436968","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}