{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:37:08Z","timestamp":1729615028216,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604195","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:59:49Z","timestamp":1287500389000},"page":"271-276","source":"Crossref","is-referenced-by-count":7,"title":["A two-tiered authentication and encryption scheme in secure healthcare sensor networks"],"prefix":"10.1109","author":[{"given":"Mohammed Raza","family":"Kanjee","sequence":"first","affiliation":[]},{"given":"Kalyani","family":"Divi","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.926434"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.190"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.36"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.251"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.583"},{"key":"ref3","article-title":"A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks","volume":"4","author":"padmavathi","year":"2009","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"journal-title":"Lecture Notes for ECE489&#x2013;549 Network Security","year":"0","author":"liu","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2006.346076"},{"key":"ref8","article-title":"ALARM-NET: Wireless Sensor Networks for Assisted-Living and Health Monitoring","author":"wood","year":"2006","journal-title":"Technical Report CS-2006&#x2013;&#x2013;01 University of Virginia"},{"key":"ref7","article-title":"Codeblue: An ad hoc sensor network infrastructure for emergency medical care","author":"malan","year":"2004","journal-title":"International Workshop on Wearable and Implantable Body Sensor Networks"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-17758-3_36","article-title":"Mobile Healthcare Infrastructure with QoS and Security","author":"mughal","year":"2010","journal-title":"MOBILe Wireless MiddleWARE Operating Systems and Applications 2010 Mobileware 2010"},{"journal-title":"the 1st International Symposium on Biomedical and Communication Technology","year":"2008","author":"dimitriou","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIMESH.2006.288632"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604195.pdf?arnumber=5604195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T11:15:41Z","timestamp":1497870941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604195","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}