{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:07:38Z","timestamp":1729638458049,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/lcn.2014.6925797","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:15:47Z","timestamp":1413994547000},"page":"382-385","source":"Crossref","is-referenced-by-count":5,"title":["Secure key renewal and revocation for Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Ismail","family":"Mansour","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Chalhoub","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[]},{"given":"Francois","family":"Delobel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.2991\/jcis.2006.314"},{"key":"13","article-title":"WSN-secure comunications with AES algoritms","author":"manica","year":"2008","journal-title":"Univ of Trento-Faculty of Computer Science"},{"year":"2000","author":"research","journal-title":"Standards for Efficient Cryptography SEC 1 Elliptic Curve Cryptography","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISCC.2003.1214142"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/IPSN.2008.47"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TDSC.2005.37"},{"key":"2","first-page":"543","article-title":"Survey and benchmark of lightweight block ciphers for wireless sensor networks","author":"cazorla","year":"2013","journal-title":"SECRYPT"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/SECPRI.2004.1301317"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1186\/1687-1499-2013-151"},{"key":"7","article-title":"The Scyther Tool: Verification, falsification, and analysis of security protocols","author":"cremers","year":"2008","journal-title":"CAV 08"},{"key":"6","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-02002-5_5","article-title":"Comparing state spaces in automatic protocol analysis","author":"cremers","year":"2009","journal-title":"Formal to Practical Security 5458\/2009"},{"key":"5","first-page":"2012","article-title":"A scheme for key revocation in wireless sensor networks","volume":"1","author":"chattopadhyay","year":"0","journal-title":"International Jo Urnal on Advanced Com-puter Engineering and Communication Technology"},{"key":"4","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE S & P"},{"key":"9","article-title":"Wsn research activities for military application","volume":"1","author":"hussain","year":"2009","journal-title":"Proceedings of the 11th International Conference on Advanced Communication Technology"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/WOWMOM.2006.23"}],"event":{"name":"2014 IEEE 39th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2014,9,8]]},"location":"Edmonton, AB","end":{"date-parts":[[2014,9,11]]}},"container-title":["39th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6916486\/6925725\/06925797.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6916486\/6925725\/06925797.pdf?arnumber=6925797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:52:18Z","timestamp":1498157538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6925797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/lcn.2014.6925797","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}