{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:31:30Z","timestamp":1730280690518,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/lcn.2018.8638102","type":"proceedings-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T20:55:48Z","timestamp":1549918548000},"page":"124-132","source":"Crossref","is-referenced-by-count":1,"title":["Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark"],"prefix":"10.1109","author":[{"given":"Flor","family":"Alvarez","sequence":"first","affiliation":[]},{"given":"Max","family":"Kolhagen","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Decentralised binding of self-certifying names to real-world identities for assessment of thirdparty messages in fragmented mobile networks","author":"seedorf","year":"2014","journal-title":"IEEE INFOCOM WKSHPS"},{"key":"ref11","article-title":"Safeslinger: easy-to-use and secure public-key exchange","author":"farb","year":"2013","journal-title":"ACM MOBICOM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435382"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"ref16","article-title":"Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises","author":"alvarez","year":"2016","journal-title":"IEEE GHTC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"journal-title":"ZXing Project","year":"0","key":"ref18"},{"journal-title":"SE-Android","year":"0","key":"ref19"},{"key":"ref4","article-title":"Why Johnny can&#x2019;t encrypt: A usability evaluation of PGP 5.0","volume":"348","author":"whitten","year":"1999","journal-title":"USENIX Security Symposium"},{"article-title":"Censors in China keep mainlanders in dark about Hong Kong protests","year":"0","author":"times","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2016.7833575"},{"article-title":"Scalable and secure multicast routing for mobile ad-hoc networks","year":"2014","author":"schmittner","key":"ref5"},{"key":"ref8","article-title":"Eaacka secure intrusiondetection system for manets","volume":"60","author":"shakshuki","year":"2013","journal-title":"IEEE TIE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"},{"article-title":"Power outages: Post-Irma recovery includes turning on the lights","year":"0","author":"ray sanchez","key":"ref2"},{"year":"0","key":"ref1","article-title":"Nepal-India earthquake"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.08.017"},{"journal-title":"Yubikey","year":"0","key":"ref20"},{"key":"ref22","article-title":"Performance based comparison study of RSA and elliptic curve cryptography","volume":"4","author":"sinha","year":"2013","journal-title":"IJSER"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref24","first-page":"24","article-title":"Survey on key revocation mechanisms in wireless sensor networks","volume":"63","author":"ge","year":"2016","journal-title":"JNCA"},{"journal-title":"SOL source code","year":"0","key":"ref23"}],"event":{"name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2018,10,1]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2018,10,4]]}},"container-title":["2018 IEEE 43rd Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635823\/8638025\/08638102.pdf?arnumber=8638102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:13:58Z","timestamp":1643249638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8638102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/lcn.2018.8638102","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}