{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:38:44Z","timestamp":1742801924339},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289154","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T18:02:15Z","timestamp":1444068135000},"page":"616-621","source":"Crossref","is-referenced-by-count":11,"title":["Fast group discovery and non-repudiation in D2D communications using IBE"],"prefix":"10.1109","author":[{"given":"Emad","family":"Abd-Elrahman","sequence":"first","affiliation":[]},{"given":"Hatem","family":"Ibn-khedher","sequence":"additional","affiliation":[]},{"given":"Hossam","family":"Afifi","sequence":"additional","affiliation":[]},{"given":"Thouraya","family":"Toukabri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Secure and smart media sharing based on direct communication among mobile devices underlying in LTE-A cellular network","year":"2014","author":"ramasubramanian","key":"ref10"},{"year":"2014","key":"ref11","article-title":"Study on Security issues to support Proximity Services (ProSe)"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162471"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2012.2234052"},{"journal-title":"Architecture Enhancements to Support Proximity Services (ProSe)","year":"2014","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645039"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807948"},{"journal-title":"Security Architecture","year":"2013","key":"ref7"},{"key":"ref2","first-page":"100","article-title":"Hybrid Model for LTE Network-Assisted D2D Communications","author":"thouraya","year":"2014","journal-title":"ADHOC-NOW"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163598"},{"key":"ref9","first-page":"43","article-title":"Secure Network Coding based Data Splitting for Public Safety D2D Communications over LTE Heterogeneous Networks","author":"chafika","year":"2014","journal-title":"Recent Advances in Computer Engineering Communications and Information Technology"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289154.pdf?arnumber=7289154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:58:47Z","timestamp":1490399927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289154","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}