{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:55:10Z","timestamp":1725666910191},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451053","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T15:06:51Z","timestamp":1203088011000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Securing inter-cluster communication in Personal Networks"],"prefix":"10.1109","author":[{"given":"Assed","family":"Jehangir","sequence":"first","affiliation":[]},{"given":"Sonia M. Heemstra","family":"de Groot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Key establishemnt in constrained devices","author":"ekberg","year":"2006","journal-title":"Research Seminar on Network Security"},{"key":"ref11","article-title":"Kerberized Internet Negotiation of Keys (KINK)","author":"sakane","year":"0","journal-title":"RFC 4430"},{"key":"ref12","article-title":"The Kerberos Network Authentication Service","author":"khol","year":"0","journal-title":"RFC 1510"},{"key":"ref13","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"3rd AT&T Software Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"journal-title":"Openvpn","year":"0","key":"ref4"},{"key":"ref3","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"0","journal-title":"RFC 2401"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2005.57"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871518"},{"key":"ref7","article-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs","author":"gura","year":"0","journal-title":"5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'04) Cambridge Boston USA"},{"journal-title":"QoS for Personal Networks Home project","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025522402484"},{"key":"ref9","article-title":"Studying Software Implementations of Elliptic Curve Cryptography","author":"yan","year":"0","journal-title":"Third International Conference on Information Technology New Generations (ITNG'06)"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","start":{"date-parts":[[2007,8,6]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451053.pdf?arnumber=4451053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T17:51:03Z","timestamp":1489686663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451053","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}