{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:23:30Z","timestamp":1725665010829},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554533","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"234-238","source":"Crossref","is-referenced-by-count":2,"title":["A Unified Key Distribution and Session Management Protocol for Mobile Video Surveillance Systems"],"prefix":"10.1109","author":[{"given":"Mohammed I.","family":"Al-Saleh","sequence":"first","affiliation":[]},{"given":"Mohammad A.","family":"Alsmirat","sequence":"additional","affiliation":[]},{"given":"Yaser","family":"Jararweh","sequence":"additional","affiliation":[]},{"given":"Islam","family":"Obaidat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment","author":"gupta","year":"2016","journal-title":"Neural Computing and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.208"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2318320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.010"},{"key":"ref14","first-page":"355","author":"lin","year":"2014","journal-title":"The Improvement of Video Streaming Security in Communication with Multiple Modes Ciphering for Handheld Devices"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2016.101"},{"key":"ref16","first-page":"324","author":"reza","year":"2013","journal-title":"QoS Aware Adaptive Security Scheme for Video Streaming in MANETs"},{"key":"ref17","first-page":"95","author":"seedorf","year":"2009","journal-title":"Security Issues for P2P-Based Voice- and Video-Streaming Applications"},{"key":"ref18","article-title":"Secure integration of iot and cloud computing","author":"stergiou","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2605045"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4488-1"},{"key":"ref27","first-page":"105","author":"yi","year":"2012","journal-title":"The Model of Face Recognition in Video Surveillance Based on Cloud Computing"},{"key":"ref3","first-page":"1","article-title":"Internet of surveillance: a cloud supported large-scale wireless surveillance system","author":"alsmirat","year":"2016","journal-title":"The Journal of Supercomputing"},{"journal-title":"AES proposal Rijndael","year":"1999","author":"daemen","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2784-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0122-4"},{"key":"ref7","first-page":"135","author":"delp","year":"2005","journal-title":"ch Watermarking Streaming Video The Temporal Synchronization Problem"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3074-7"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-0105-3","author":"gupta","year":"2016","journal-title":"Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security IGI Global"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2010.15"},{"key":"ref20","first-page":"284","article-title":"An integrated radix-4 modular divider\/multiplier hardware architecture for cryptographic applications","author":"tawalbeh","year":"2013","journal-title":"The International Arab Journal of Information Technology"},{"journal-title":"Digital Certificates","year":"2001","author":"tycksen","key":"ref22"},{"journal-title":"Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms","year":"2011","author":"turner","key":"ref21"},{"key":"ref24","first-page":"551","author":"wei","year":"2015","journal-title":"Architecture and Scheduling Method of Cloud Video Surveillance System Based on IoT"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1186-x"},{"key":"ref26","first-page":"544","author":"yang","year":"2016","journal-title":"Multi-resource Allocation for Virtual Machine Placement in Video Surveillance Cloud"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00607-014-0408-7","article-title":"Semantic enhanced cloud environment for surveillance data management using video structural description","author":"xu","year":"2016","journal-title":"Computing"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554533.pdf?arnumber=8554533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:25:12Z","timestamp":1643250312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554533","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}