{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:27:50Z","timestamp":1767907670354,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.1109\/isivc61350.2024.10577843","type":"proceedings-article","created":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:28:23Z","timestamp":1720114103000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Securing IoT Communication: A Steganographic Protocol for Efficient Mutual Authentication and Data Integrity"],"prefix":"10.1109","author":[{"given":"Youssef Nour-El","family":"Aine","sequence":"first","affiliation":[{"name":"Hassan II University, Mohammedia,Lab of Mathematics, Computer Science and Applications FST Mohammedia,Morocco"}]},{"given":"Cherkaoui","family":"Leghris","sequence":"additional","affiliation":[{"name":"Hassan II University, Mohammedia,Lab of Mathematics, Computer Science and Applications FST Mohammedia,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2022.07.088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2948027"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2018.1555383"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icisct52966.2021.9670265"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.13052\/jmm1550-4646.1521"},{"key":"ref6","first-page":"1","article-title":"Secure Protocol for Resource-Constrained IoT Device Authentication","volume":"14","author":"Nyangaresi","year":"2022","journal-title":"Int. J. Interdiscip. Telecommun. Netw."},{"key":"ref7","first-page":"50","article-title":"Implementation and Performance Analysis of Lightweight Block Ciphers for IoT applications using the Contiki Operating system","volume-title":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","author":"Hkiri"},{"key":"ref8","article-title":"Ensuring Smart Agriculture System Communication Confidentiality Using a New Network Steganography Method","volume-title":"Smart and Sustainable Agriculture. SSA 2021. Communications in Computer and Information Science","volume":"1470","author":"Nour-El Aine"},{"issue":"4","key":"ref9","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3390\/s21041488","article-title":"A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes","volume":"21","author":"Oh","year":"2021","journal-title":"Sensors"},{"issue":"9","key":"ref10","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.3390\/s19092098","article-title":"An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances","volume":"19","author":"Mart\u00ednez-Pel\u00e1ez","year":"2019","journal-title":"Sensors"},{"issue":"2","key":"ref11","doi-asserted-by":"crossref","first-page":"181","DOI":"10.23919\/JCIN.2022.9815201","article-title":"A Lightweight Mutual Authentication Protocol for IoT","volume":"7","author":"Ehui","year":"2022","journal-title":"Journal of Communications and Information Networks"},{"issue":"6","key":"ref12","doi-asserted-by":"crossref","first-page":"989","DOI":"10.3390\/electronics9060989","article-title":"A Situation-Aware Scheme for Efficient Device Authentication in Smart Grid-Enabled Home Area Networks","volume":"9","author":"Xiang","year":"2020","journal-title":"Electronics"},{"key":"ref13","first-page":"82","article-title":"Performance Comparison of Cryptosystems in Context to Internet of Things","volume-title":"2022 4th International Conference on Data Intelligence and Security (ICDIS)","author":"Saini"}],"event":{"name":"2024 IEEE 12th International Symposium on Signal, Image, Video and Communications (ISIVC)","location":"Marrakech, Morocco","start":{"date-parts":[[2024,5,21]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["2024 IEEE 12th International Symposium on Signal, Image, Video and Communications (ISIVC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10577657\/10577765\/10577843.pdf?arnumber=10577843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T04:00:11Z","timestamp":1720411211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10577843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isivc61350.2024.10577843","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}