{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:02:30Z","timestamp":1729652550479,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266521","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T17:59:13Z","timestamp":1443117553000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Serverless lightweight mutual authentication protocol for small mobile computing devices"],"prefix":"10.1109","author":[{"given":"Collins","family":"Mtita","sequence":"first","affiliation":[]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Daragon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"US Secure Hash Algorithm 1 (SHAl)","year":"2001","author":"eastlake","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1368310.1368317","article-title":"Hmac is a randomness extractor and applications to tIs","author":"fouque","year":"2008","journal-title":"Proceedings of the 2008 ACM symposium on Information computer and communications security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9786-0"},{"journal-title":"energy and consumptions","year":"2011","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2010.5446669"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8237-7_13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1246"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2009.159"},{"key":"ref18","first-page":"701","article-title":"Performance evaluation of the ieee 802.15. 4 mac for low-rate low-power wireless networks","author":"lu","year":"2004","journal-title":"Performance Computing and Communications 2004 IEEE International Conference on"},{"key":"ref19","first-page":"187","article-title":"Identity establishment and capability based access control (iecac) scheme for internet of things","author":"mahalle","year":"2012","journal-title":"Wireless Personal Multimedia Communications (WPMC) 2012 15th International Symposium on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref27","article-title":"The high-level protocol specification language hlpsl developed in the eu project avispa","author":"von oheimb","year":"0","journal-title":"Proceedings of APPSEM 2005 Workshop 2005"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"The avispa tool for the automated validation of internet security protocols and applications","author":"armando","year":"2005","journal-title":"Computer Aided Verification"},{"key":"ref6","first-page":"150","article-title":"A comparison of mac protocols for wireless local networks based on battery power consumption","volume":"1","author":"chen","year":"1998","journal-title":"INFOCOM'9B Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6488-3_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01273-5_119"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2008.20"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134704"},{"key":"ref22","first-page":"30","article-title":"Analyzing the energy consumption of security protocols","author":"nachiketh","year":"2003","journal-title":"Proceedings of the 2003 International Symposium on Low Power Electronics and Design"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.09.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36140-1_1"},{"key":"ref23","article-title":"An improvement over a server-less rfid authentication protocol","volume":"7","author":"pourpouneh","year":"2014","journal-title":"International Journal of Computer Network and Information Security (IJCNIS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061080"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.30"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266521.pdf?arnumber=7266521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,22]],"date-time":"2022-05-22T02:49:59Z","timestamp":1653187799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266521","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}