{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:13:51Z","timestamp":1729635231524,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/pcthealth.2008.4571031","type":"proceedings-article","created":{"date-parts":[[2008,7,29]],"date-time":"2008-07-29T14:30:52Z","timestamp":1217341852000},"page":"73-76","source":"Crossref","is-referenced-by-count":8,"title":["Timestamp authentication protocol for remote monitoring in eHealth"],"prefix":"10.1109","author":[{"given":"Kalid","family":"Elmufti","sequence":"first","affiliation":[]},{"given":"Dasun","family":"Weerasinghe","sequence":"additional","affiliation":[]},{"given":"M.","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Veselin","family":"Rakocevic","sequence":"additional","affiliation":[]},{"given":"Sanowar","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"timed models for protocol security","year":"1992","author":"heintze","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1504\/IJEH.2007.015320"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/155848.155852"},{"article-title":"timestamps and authentication protocols","year":"2005","author":"mitchell","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","article-title":"paul van oorschot, and scott a. vanston","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"8","first-page":"813","article-title":"efficient mutual authenticaion scheme with smart card","volume":"4088","author":"yoon","year":"2006","journal-title":"Lecture Notes in Artificial Intelligence"}],"event":{"name":"2008 Second International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth)","start":{"date-parts":[[2008,1,30]]},"location":"Tampere, Finland","end":{"date-parts":[[2008,2,1]]}},"container-title":["2008 Second International Conference on Pervasive Computing Technologies for Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4562769\/4571002\/04571031.pdf?arnumber=4571031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:28:00Z","timestamp":1497767280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4571031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/pcthealth.2008.4571031","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}