{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:50:31Z","timestamp":1767372631429,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266475","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["BSD-based elliptic curve cryptography for the open Internet of Things"],"prefix":"10.1109","author":[{"given":"Oriol Pinol","family":"Pinol","sequence":"first","affiliation":[]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Joakim","family":"Eriksson","sequence":"additional","affiliation":[]},{"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"article-title":"Elliptic Curves: Number Theory and Cryptography","year":"2003","author":"washington","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"ref13","first-page":"138","article-title":"Reflexions sur la resolution algebrique des equations","author":"lagrange","year":"1971","journal-title":"Nouveaux Memoires de l Academie Royale des Sciences et Belles-Lettres de Berlin"},{"article-title":"Fundamental elliptic curve cryptography algorithms","year":"0","author":"igoe","key":"ref14"},{"key":"ref15","first-page":"1","article-title":"IEEE standard specifications for public-key cryptography","year":"2000","journal-title":"IEEE Std 1363&#x2013;2000"},{"key":"ref16","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"el gamal","year":"1985","journal-title":"Advances in Cryptology Proc Crypto'84"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.143"},{"key":"ref18","article-title":"The Art of Computer Programming","volume":"2","author":"knuth","year":"1997","journal-title":"Seminumerical Algorithms"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1163-6"},{"key":"ref4","article-title":"Con tiki - a lightweight and flexible operating system for tiny networked sensors","author":"dunkels","year":"0","journal-title":"29th Annual IEEE International Conference on Local Computer Networks 2004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1157-0_48"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/19393551003649016"},{"key":"ref2","article-title":"The Constrained Application Protocol (CoAP)","author":"shelby","year":"2014","journal-title":"RFC 7252 Internet Engineering Task Force"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.406"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_22"},{"key":"ref20","article-title":"On the implementation of ellxpkuoiptic curve cryptosys-terns","author":"bender","year":"0","journal-title":"Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology ser CRYPTO &#x2018;89"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"1996"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_20"},{"journal-title":"ST Microelectronics","article-title":"STM32W108CC Data Sheet","year":"0","key":"ref23"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266475.pdf?arnumber=7266475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:09:30Z","timestamp":1498248570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266475","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}