{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:35:49Z","timestamp":1725410149083},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761263","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"336-339","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the energy-efficiency of the Rich Uncle key exchange protocol in WSNs"],"prefix":"10.1109","author":[{"given":"Christian","family":"Haas","sequence":"first","affiliation":[]},{"given":"Joachim","family":"Wilke","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Knittel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2068897.2068905"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"12","first-page":"71","article-title":"SANDbed: A WSAN testbed for network management and energy monitoring","author":"hergenroeder","year":"2009","journal-title":"5 Fachgespra?ch Drahtlose Sensornetze"},{"key":"3","first-page":"82","article-title":"Realistic simulation of energy consumption in wsn","author":"haas","year":"2012","journal-title":"Wireless Sensor Networks volume 7158 of Lecture Notes in Computer Science"},{"key":"2","first-page":"580","article-title":"On the energy cost of communication and cryptography in wsn","author":"de meulenaer","year":"0","journal-title":"Wireless Comm and Mobile Computing Conference"},{"journal-title":"Constraints and approaches for distributed sensor network security","year":"0","author":"carman","key":"1"},{"journal-title":"BoX-MACs Exploiting Physical and Link Layer Boundaries in Low-power Networking","year":"2008","author":"moss","key":"10"},{"journal-title":"The Design of Rijndae\/ AES-The Advanced Encryption Standard","year":"2002","author":"joan","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842555"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199337"},{"journal-title":"RELIC Is An Efficient LIbrary for Cryptography","year":"0","author":"aranha","key":"9"},{"key":"8","first-page":"245","article-title":"Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks","author":"an","year":"2008","journal-title":"International Conference on Information Processing in Sensor Networks (IPSN'05)"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761263.pdf?arnumber=6761263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:05:38Z","timestamp":1490292338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761263","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}