{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T12:18:12Z","timestamp":1775218692494,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/vitae.2014.6934425","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T04:54:04Z","timestamp":1414817644000},"page":"1-5","source":"Crossref","is-referenced-by-count":48,"title":["Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)"],"prefix":"10.1109","author":[{"given":"Parikshit N.","family":"Mahalle","sequence":"first","affiliation":[]},{"given":"Neeli Rashmi","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Ramjee","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"A lightweight distributed group authentication mechanism","author":"martucci","year":"0","journal-title":"Proc of 4th International Network Conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.2246"},{"key":"13","article-title":"Does profiling make us more secure","volume":"10","author":"shari lawrence","year":"2012","journal-title":"IEEE Security and Privacy"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.25"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.091212.120575"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0807"},{"key":"3","first-page":"184","article-title":"Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things","author":"parikshit","year":"2012","journal-title":"Proceedings of IEEE 15th International Symposium on Wireless Personal Multimedia Communications (WPMC-2012)"},{"key":"2","first-page":"309","article-title":"Identity authentication and capability based access (IACAC) control for the internet of things","volume":"1","author":"mahalle","year":"2013","journal-title":"Journal of Cyber Security and Mobility"},{"key":"1","article-title":"Internet of things: An early reality of the future internet","year":"2009","journal-title":"Workshop Report European Commission Information Society and Media"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110417"},{"key":"5","first-page":"223","article-title":"Public-key cryptosystems based on composite deg ree residuosity classes","author":"paillier","year":"1999","journal-title":"Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT)"},{"key":"4","article-title":"Proposed on device capability based authentication using AES-GCM for internet of things (IoT)","author":"babar","year":"2011","journal-title":"Proceedings of 3rd in Ternational ICST Conference on Security and Privacy in Mobile Information and Communication Systems (Mobisec 2011)"},{"key":"9","article-title":"Group authentication","author":"harn","year":"2012","journal-title":"IEEE Transactions on Computers"},{"key":"8","author":"goh","year":"2007","journal-title":"Encryption Schemes from Bilinear Maps"}],"event":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","location":"Aalborg, Denmark","start":{"date-parts":[[2014,5,11]]},"end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6917160\/6934393\/06934425.pdf?arnumber=6934425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:31:17Z","timestamp":1490308277000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/vitae.2014.6934425","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}