{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:58:20Z","timestamp":1725577100701},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,30]]},"DOI":"10.1109\/wd52248.2021.9508298","type":"proceedings-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T20:54:42Z","timestamp":1628628882000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT"],"prefix":"10.1109","author":[{"given":"Khaled","family":"Hamouid","sequence":"first","affiliation":[]},{"given":"Mawloud","family":"Omar","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Adi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02613-4_42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800288"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"ref15","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1990","journal-title":"Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815032-0.00006-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2019.8719256"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6809796"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.013180"},{"article-title":"Identity management for internet of things","year":"2015","author":"mahalle","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2156790"}],"event":{"name":"2021 Wireless Days (WD)","start":{"date-parts":[[2021,6,30]]},"location":"Paris, France","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 Wireless Days (WD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9508265\/9508266\/09508298.pdf?arnumber=9508298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:01Z","timestamp":1652197441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9508298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wd52248.2021.9508298","relation":{},"subject":[],"published":{"date-parts":[[2021,6,30]]}}}