{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:40:04Z","timestamp":1729662004844,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/lcn.2009.5355012","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T13:26:49Z","timestamp":1261661209000},"page":"858-864","source":"Crossref","is-referenced-by-count":2,"title":["Using Merkle's Puzzle for key agreement with low-end devices"],"prefix":"10.1109","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/986858.986870"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICPPW.2003.1240399"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIT.1983.1056650"},{"year":"0","article-title":"Security Requirements for Cryptographic Modules","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICDCSW.2005.119"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/3-540-39799-X_29"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/378993.379006"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1031495.1031515"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1002\/0470095121"},{"year":"0","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/49.232291"},{"key":"ref27","first-page":"64","article-title":"Security and Privacy in RFID and Applications in Telemedicine","author":"xiao","year":"2006","journal-title":"IEEE Communications Magazine Special issue on Quality Assurance and Devices in Telemedicine"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/PIMRC.1992.279969"},{"key":"ref6","first-page":"110","article-title":"Improved Time-Memory Trade-Offs with Multiple Data","author":"biryukov","year":"2005","journal-title":"Proc Selected Areas in CryptographySAC 2005"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1049\/el:19930666"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/11733447_21","article-title":"Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags","author":"castelluccia","year":"2006","journal-title":"7th Smart Card Research and Advanced Application IFIP Conference (CARDIS'06)"},{"year":"0","author":"biryukov","article-title":"Some Thoughts on Time-Memory-Data Tradeotls","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/GLOCOM.1991.188696"},{"key":"ref9","article-title":"Shake then up!","author":"castelluccia","year":"2005","journal-title":"ACM\/USENIX MobiSys"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/302350.302353"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/359460.359473"},{"key":"ref22","first-page":"2","article-title":"The TESLA broadcast Authentication protocol","volume":"5","author":"perrig","year":"2002","journal-title":"CryptoBytes"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-540-40974-8_28"},{"key":"ref24","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"Security Protocols 7th International Workshop Proceedings LNCS"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/381677.381696"},{"key":"ref26","first-page":"73","article-title":"Zero common knowledge authentication for pervasive networks","author":"weimerskirch","year":"2003","journal-title":"Proceedings of Selected Areas of Cryptography 2003 (SAC2003) LNCS 3006"},{"key":"ref25","article-title":"Lightweight authentication protocols for low-cost RFID tags","author":"vayda","year":"2003","journal-title":"Proc Workshop Security in Ubiquitous Computing"}],"event":{"name":"2009 IEEE 34th Conference on Local Computer Networks (LCN 2009)","start":{"date-parts":[[2009,10,20]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2009,10,23]]}},"container-title":["2009 IEEE 34th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5347306\/5354999\/05355012.pdf?arnumber=5355012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:13:15Z","timestamp":1497827595000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5355012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/lcn.2009.5355012","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}