{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:24:16Z","timestamp":1774542256120,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percomw.2017.7917637","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T16:32:54Z","timestamp":1493915574000},"page":"636-641","source":"Crossref","is-referenced-by-count":6,"title":["Shortening the security parameters in lightweight WSN applications for IoT - lessons learned"],"prefix":"10.1109","author":[{"given":"Anna","family":"Sojka-Piotrowska","sequence":"first","affiliation":[]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2010","journal-title":"User's Guide"},{"key":"ref11","author":"martinez","year":"2010","journal-title":"A Survey of the Elliptic Curve Integrated Encryption Scheme"},{"key":"ref12","article-title":"Self-certified public keys","author":"girault","year":"2001","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/11507840_5","article-title":"Identity-based partial message recovery signatures (or how to shorten ID-based signatures)","author":"zhang","year":"2005","journal-title":"Financial Cryptography and Data Security"},{"key":"ref14","article-title":"Signing a digitalsignature without using one-way hash functions and message redundancy schemes","author":"chan","year":"2004","journal-title":"Communications Letters IEEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: security protocols for sensor networks","author":"perrig","year":"2002","journal-title":"Wirel Netw"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.93"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1868630.1868646"},{"key":"ref6","article-title":"LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network","author":"riaz","year":"2006","journal-title":"PWC"},{"key":"ref5","article-title":"ImRFNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks","author":"sojk","year":"2012","journal-title":"SECRYPT"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1201\/9781420071474","author":"washington","year":"2008","journal-title":"Elliptic Curves Number Theory and Cryptography"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90a"},{"key":"ref2","author":"barker","year":"2015","journal-title":"Special Publication 800&#x2013;57 Part 1 Revision 3 NIST"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"},{"key":"ref9","author":"hankerson","year":"2003","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325652"},{"key":"ref22","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SRDSW.2011.14"},{"key":"ref24","year":"2017"},{"key":"ref23","year":"2017"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)","location":"Kona, HI","start":{"date-parts":[[2017,3,13]]},"end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911894\/7917470\/07917637.pdf?arnumber=7917637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T05:38:52Z","timestamp":1569217132000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7917637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/percomw.2017.7917637","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}