{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:36:24Z","timestamp":1730302584489,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/vitae.2014.6934429","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T04:54:04Z","timestamp":1414817644000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Exchanging information in wireless sensor networks at very low time consumption rate in an efficient hybrid cryptographic algorithm"],"prefix":"10.1109","author":[{"given":"Piyar Ali","family":"Jatoi","sequence":"first","affiliation":[]},{"given":"B. S","family":"Chowdhry","sequence":"additional","affiliation":[]},{"given":"Aftab A","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Muhammad Ghazanfar","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Shiraz","family":"Latif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.004"},{"key":"17","first-page":"3042","volume":"53","author":"ssu","year":"2009","journal-title":"Detecting Sybil attacks in Wireless Sensor Networks using neighboring information"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.12.021"},{"key":"15","first-page":"2292","volume":"52","author":"mukherjee","year":"2008","journal-title":"Wireless sensor network survey"},{"key":"16","first-page":"818","volume":"31","author":"tripathy","year":"2008","journal-title":"Defense against outside attacks in wireless sensor networks"},{"key":"13","first-page":"189","article-title":"Secure and trusted in-network data processing in wireless sensor networks: A survey","volume":"2","author":"sorniotti","year":"2007","journal-title":"Journal of Information Assurance and Security"},{"key":"14","first-page":"166","volume":"79","author":"christopher","year":"2008","journal-title":"Progress in Identifying Virulence Determinants of the 1918 H1N1 and the Southeast Asian H5N1 Influenza A Virus's Review Article Antiviral Research"},{"key":"11","first-page":"139","article-title":"Group based secure communication for large-scale wireless sensor networks","volume":"2","author":"kifayat","year":"2007","journal-title":"Journal of Information Assurance and Security"},{"key":"12","first-page":"48","article-title":"A low-energy security algorithm for exchanging information in wireless sensor networks","volume":"4","author":"rousan","year":"2007","journal-title":"Journal of Information Assurance and Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1177\/10943420020160030901"},{"key":"20","first-page":"74","article-title":"A Hybrid Cryptographic Algorithm in Wireless Sensor Networks for exchanging information at low memory consumption rate","volume":"4","author":"jatoi","year":"2012","journal-title":"Science Series Data Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313529"},{"key":"1","first-page":"120","author":"rivest","year":"1998","journal-title":"A Method for Obtaining Digital Signatures and Public-key Cryptosystems Commun Ications of the ACM"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"6","first-page":"119","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"5","first-page":"1","article-title":"Secure routing in sensor networks: Attacks and counter measures","author":"karlof","year":"2003","journal-title":"Proceedings of the 1st IEEE Workshop on Sensor Network Protocols and Applications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941372"},{"key":"9","first-page":"12","article-title":"Formal verifica tion of Ad-Hoc routing protocols using spin Model Checker","author":"renesse","year":"2005","journal-title":"IEEE Melecon"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"}],"event":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6917160\/6934393\/06934429.pdf?arnumber=6934429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:31:18Z","timestamp":1490308278000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/vitae.2014.6934429","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}