{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T14:27:08Z","timestamp":1663511228693},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Air Force Office of Scientific Research, Arlington, VA, USA","award":["FA9550-09-1-0479","FA9550-09-1-0165","FA9550-10-1-0289"],"award-info":[{"award-number":["FA9550-09-1-0479","FA9550-09-1-0165","FA9550-10-1-0289"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/tifs.2014.2323700","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T18:02:00Z","timestamp":1400090520000},"page":"1133-1140","source":"Crossref","is-referenced-by-count":2,"title":["A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol"],"prefix":"10.1109","volume":"9","author":[{"given":"David","family":"Irakiza","sequence":"first","affiliation":[{"name":"Center for Secure Cyberspace, Louisiana Tech University, Ruston, LA, USA"}]},{"given":"Md E.","family":"Karim","sequence":"additional","affiliation":[{"name":"Center for Secure Cyberspace, Louisiana Tech University, Ruston, LA, USA"}]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[{"name":"Center for Secure Cyberspace, Louisiana Tech University, Ruston, LA, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_18"},{"key":"ref11","first-page":"7","article-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"smetters","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref12","first-page":"302","article-title":"Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions","author":"mashatan","year":"0","journal-title":"Proc IACR Cryptol ePrint Archive"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_28"},{"key":"ref14","year":"2014","journal-title":"Trusted Platform Module"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2006.42"},{"key":"ref16","year":"2012","journal-title":"Raspberry Pi"},{"key":"ref17","first-page":"3","article-title":"Separating two roles of hashing in one-way message authentication","author":"nguyen","year":"0","journal-title":"Proc IACR Cryptol ePrint Archive"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0403"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.50"},{"key":"ref3","first-page":"307","article-title":"Not-a-bot: Improving service availability in the face of botnet attacks","author":"gummadi","year":"0","journal-title":"Proc 6th USENIX Symp Netw Syst Design Implement"},{"key":"ref6","year":"2013","journal-title":"Spam Database Lookup"},{"key":"ref5","author":"gupta","year":"2000","journal-title":"Algorithms for Routing Lookups and Packet Classification"},{"key":"ref8","article-title":"Method and apparatus for automatically detecting sensitive information, applying policies based on a structured taxonomy and dynamically enforcing and reporting on the protection of sensitive data through a software permission wrapper","author":"duncan","year":"2006"},{"key":"ref7","year":"2013","journal-title":"The Spamhaus Block List"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030100"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565013"},{"key":"ref9","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"RSA CryptoBytes"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6819111\/06815645.pdf?arnumber=6815645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T14:20:29Z","timestamp":1655302829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6815645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":20,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2323700","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}