{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:20:26Z","timestamp":1759134026048,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/iswpc.2013.6707446","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:09:02Z","timestamp":1389366542000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks"],"prefix":"10.1109","author":[{"family":"Debiao He","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Chilamkurti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology"},{"key":"17","article-title":"An enhanced two-factor user authentication in wireless sensor networks","author":"yuan","year":"2013","journal-title":"Telecommunication Systems"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.010"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/s110504767"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/730831"},{"key":"13","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks","volume":"10","author":"khan","year":"2010","journal-title":"SENSORS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"key":"11","first-page":"88","article-title":"Robust dynamic user authentication scheme for wireless sensor networks","author":"binod","year":"2009","journal-title":"Proc of ACM Q2SWinet'05"},{"journal-title":"Improvement of Das's Twofactor Authentication Protocol in Wireless Sensor Networks","year":"0","author":"nyang","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"3","first-page":"1","article-title":"Realizing robust user authentication in sensor networks","author":"benenson","year":"2005","journal-title":"Proceedings of Workshop on Realworld Wireless Sensor Networks Stockholm"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"2","first-page":"385","article-title":"User authentication in sensor networks","author":"benenson","year":"2004","journal-title":"Workshop on Sensor Networks"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814918"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2008.4726128"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"4","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1002\/dac.1097","article-title":"User authentication schemes with pseudonymity for ubiquitous sensor network in NGN","volume":"23","author":"binod","year":"2010","journal-title":"International Journal of Communication Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.43"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.190"}],"event":{"name":"2013 International Symposium on Wireless and Pervasive Computing (ISWPC)","start":{"date-parts":[[2013,11,20]]},"location":"Taipei","end":{"date-parts":[[2013,11,22]]}},"container-title":["International Symposium on Wireless and pervasive Computing (ISWPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6695813\/6707422\/06707446.pdf?arnumber=6707446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:51:05Z","timestamp":1498096265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6707446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iswpc.2013.6707446","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}