{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:01:37Z","timestamp":1729659697985,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/issnip.2014.6827621","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T21:55:33Z","timestamp":1403301333000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["An identity-based authentication protocol for sensor networks"],"prefix":"10.1109","author":[{"given":"Mee Loong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Al-Anbuky","sequence":"additional","affiliation":[]},{"given":"William","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"4045","article-title":"An improved matrix key predistribution scheme for wireless sensor networks","author":"chen","year":"2008","journal-title":"International Conference on Embedded Software Systems"},{"journal-title":"An Optimal Class of Symmetric Key Generation Systems","year":"1984","author":"blom","key":"17"},{"key":"18","article-title":"A pairwise key predistribution scheme for wireless sensor networks","author":"du","year":"2003","journal-title":"Proceedings of the Conference on Computer and Communications Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_22"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.947"},{"key":"14","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","article-title":"TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks","volume":"34","author":"oliveira","year":"2011","journal-title":"Computer Communications"},{"key":"11","first-page":"228","article-title":"Public-key revocation and tracing schemes with subset difference methods","volume":"2013","author":"lee","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"12","first-page":"20","article-title":"Tinytate: Identity-based encryption for sensor networks","volume":"2007","author":"oliveira","year":"2007","journal-title":"IACR Cryptology ePrint Archive"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2050140"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2013.6765983"},{"key":"1","first-page":"231","article-title":"A fast and efficient key agreement scheme for wireless sensor networks","author":"yang","year":"2012","journal-title":"International Conference on Wireless and Mobile Communications"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/1229285.1229334","article-title":"The energy cost of cryptographic key establishment in wireless sensor networks","author":"grosschadl","year":"2007","journal-title":"Proc The 2nd ACM Symposium on Information Compter and Communication Security"},{"key":"4","article-title":"Kerberos: An authentication service for open network systems","author":"steiner","year":"1988","journal-title":"Proceedings of the Winter 1988 Usenix Conference"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022595222606"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"}],"event":{"name":"2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)","start":{"date-parts":[[2014,4,21]]},"location":"Singapore","end":{"date-parts":[[2014,4,24]]}},"container-title":["2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820824\/6827478\/06827621.pdf?arnumber=6827621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T21:07:25Z","timestamp":1649452045000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6827621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/issnip.2014.6827621","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}