{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:12Z","timestamp":1761648312734},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289208","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:02:15Z","timestamp":1444082535000},"page":"935-940","source":"Crossref","is-referenced-by-count":2,"title":["A symmetric cryptographic construct for securing wireless sensor network communications"],"prefix":"10.1109","author":[{"given":"A. A.","family":"Adekunle","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1576557"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/3-540-45708-9_21","article-title":"Black-box analysis of the block-cipher-based hash-function constructions from PGV","author":"black","year":"2002","journal-title":"Proc CRYPTO 2002"},{"key":"ref13","article-title":"The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE","author":"khovratovich","year":"2013","journal-title":"Selected Areas in Cryptography 2013 (SAC 2013)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WiSEE.2013.6737568"},{"year":"0","key":"ref4","article-title":"Special publication 800-38D, recommendation for block cipher modes of operation: galois\/counter mode (GCM) and GMAC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WiAd.2012.6296560"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_13"},{"year":"0","key":"ref5","article-title":"FIPS publication 197 advanced encryption standard (AES)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2014.6958560"},{"year":"0","key":"ref7","article-title":"Special publication 800-38C, recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality"},{"key":"ref2","article-title":"That internet of things thing","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref1","article-title":"From devices to ambient intelligence","author":"zelkha","year":"1998","journal-title":"Digital Living Conferencer"},{"key":"ref9","article-title":"ALE: aes-based lightweight authenticated encryption","author":"bogdanov","year":"2013","journal-title":"Fast Software Encryption"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289208.pdf?arnumber=7289208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:48:54Z","timestamp":1498250934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289208","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}