{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:30:07Z","timestamp":1730280607443,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366358","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:15:34Z","timestamp":1452186934000},"page":"482-485","source":"Crossref","is-referenced-by-count":8,"title":["Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Pawani","family":"Porambage","sequence":"first","affiliation":[]},{"given":"An","family":"Braeken","sequence":"additional","affiliation":[]},{"given":"Corinna","family":"Schmitt","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2003","author":"hankerson","journal-title":"Guide to Elliptic Curve Cryptography","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2009.2012389"},{"key":"ref12","article-title":"On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things","volume":"2013","author":"hong","year":"2013","journal-title":"Hindawi Publishing Corporation International Journal of Distributed Sensor Networks"},{"year":"1975","author":"davis","journal-title":"Interpolation and Approximation","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.12785\/amis\/070532"},{"year":"2001","author":"shoup","article-title":"A Proposal for an ISO Standard for Public Key Encryption","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref4","article-title":"MIKEY: Multimedia Internet KEYing","author":"arkko","year":"2004","journal-title":"RFC 3830"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.adhoc.2013.05.003"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11277-008-9653-4"},{"key":"ref5","article-title":"Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction","author":"perrig","year":"2005","journal-title":"RFC 4082"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1587\/transinf.E94.D.2069"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TC.2010.40"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.jnca.2009.10.001"},{"key":"ref1","article-title":"DTLS-based Multicast Security for Low-Power and Lossy Networks","author":"keoh","year":"2014","journal-title":"IETF draft RFC editor"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INFCOM.2013.6566764"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366358.pdf?arnumber=7366358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:29:38Z","timestamp":1490398178000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366358","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}