{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:18:06Z","timestamp":1730265486890,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/iisa.2014.6878816","type":"proceedings-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T20:20:28Z","timestamp":1408566028000},"page":"373-378","source":"Crossref","is-referenced-by-count":1,"title":["An ICMetric based key generation scheme for controlled group communication"],"prefix":"10.1109","author":[{"given":"Shahzaib","family":"Tahir","sequence":"first","affiliation":[]},{"given":"Mehreen","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Tahir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32166-5"},{"journal-title":"Investigation of the Potential of Generating Encryption Keys for ICMetrics","year":"2009","author":"papoutsis","key":"11"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"1995","author":"schneier","key":"12"},{"key":"3","article-title":"HMQV: A high-performance secure Diffie-Hellman protocol","author":"krawczyk","year":"0","journal-title":"Proc crypto'05"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_18"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10","first-page":"49","article-title":"Overview of ICmetrics technology - Security infrastructure for autonomous and intelligent healthcare system","volume":"4","author":"kovalchuk","year":"2011","journal-title":"International Journal of U- And E-service Science and Technology"},{"key":"7","first-page":"45","article-title":"EAB-euclidian algorithm based key computation protocol for secure group communication in dynamic grid environment","volume":"3","author":"venkatesulu","year":"2010","journal-title":"International Journal of Grid and Distributed Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.819978"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"4","first-page":"1","article-title":"Group-based secure communication for large-scale wireless sensor networks","author":"kifayat","year":"2007","journal-title":"Network and Information Security Technology Lab"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2013.21"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2012.22"}],"event":{"name":"2014 5th International Conference on Information, Intelligence, Systems and Applications (IISA)","start":{"date-parts":[[2014,7,7]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2014,7,9]]}},"container-title":["IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6872645\/6878713\/06878816.pdf?arnumber=6878816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:03:27Z","timestamp":1602687807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6878816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iisa.2014.6878816","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}