{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:58:40Z","timestamp":1730260720706,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345607","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T15:43:49Z","timestamp":1260459829000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["SecSyWiSe: A secure time synchronization scheme in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Barnickel","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","article-title":"Recommendation for key management - part 1: General","author":"barker","year":"2005","journal-title":"NIST Special Publication 800-57 August 2005"},{"year":"0","key":"16"},{"key":"13","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"adrian perrig","year":"2002","journal-title":"CryptoBytes"},{"key":"14","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"boneh","year":"1999","journal-title":"Notices of the American Mathematical Society (AMS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.697"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060304"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0778"},{"year":"0","key":"10"},{"journal-title":"A Secure Time Synchronization Protocol for Sensor Network in Lecture Notes in Computer Science","year":"2007","author":"hui li","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380571"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029111"},{"key":"8","article-title":"Tiny-SeRSync: Secure and resilient time synchronization in wireless sensor networks","author":"sun","year":"2006","journal-title":"Proceedings of the 13th ACM conference on Computer and communications security"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345607.pdf?arnumber=5345607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T02:27:45Z","timestamp":1489890465000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345607","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}