{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:13:02Z","timestamp":1755792782078,"version":"3.44.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845465","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"295-300","source":"Crossref","is-referenced-by-count":1,"title":["Rapid group key creation for expanding mesh networks"],"prefix":"10.1109","author":[{"given":"William V.","family":"Oxford","sequence":"first","affiliation":[{"name":"Rubicon Labs, Austin, TX, San Francisco, CA USA"}]},{"given":"Rod","family":"Schultz","sequence":"additional","affiliation":[{"name":"Rubicon Labs, Austin, TX, San Francisco, CA USA"}]},{"given":"Julia K.","family":"Cline","sequence":"additional","affiliation":[{"name":"Rubicon Labs, Austin, TX, San Francisco, CA USA"}]}],"member":"263","reference":[{"key":"ref10","article-title":"TLS\/DTLS Optimizations for Internet of Things Deployments","author":"fossati","year":"2016","journal-title":"IETF Informational Draft"},{"key":"ref11","article-title":"An architecture for authorization in constrained environments","author":"gerdes","year":"2016","journal-title":"IETF Informational Draft"},{"key":"ref12","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"0","journal-title":"Advances in Cryptology - CRYPTO 2001"},{"article-title":"IBAKE: Identity-Based Authenticated Key Exchange Protocol","year":"0","author":"kolesnikov","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2006.384705"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/10720107_24","article-title":"The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks","volume":"1796","author":"stajano","year":"1999","journal-title":"Proc 7th Security Protocols Workshop"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/10722028_23","article-title":"A one round protocol for tripartite Diffie-Hellman","author":"joux","year":"2000","journal-title":"The 4th Algorithmic Number Theory Symposium - ANTS IV"},{"key":"ref5","first-page":"23","article-title":"Talking to Strangers: Authentication in Ad-Hoc Wireless Networks","author":"balfanz","year":"2002","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_8"},{"key":"ref7","first-page":"31","article-title":"Threshold Signatures, Multisignatures and Blind Signatures based on the Gap-Diffie-Hellman-Group Signature scheme","volume":"2567","author":"boldyreva","year":"2002","journal-title":"Public Key Cryptography"},{"journal-title":"Top 10 Strategic Technology Trends for 2016 The Device Mesh","year":"2015","author":"cearley","key":"ref2"},{"journal-title":"Cisco Visual Networking Index (VNI) Mobile Data Traffic Update 2015&#x2013;2020","year":"0","author":"barnett","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/93385.93417"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845465.pdf?arnumber=7845465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:39Z","timestamp":1755197019000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845465","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}