{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:17:13Z","timestamp":1730305033119,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wf-iot.2019.8767211","type":"proceedings-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:04:42Z","timestamp":1563840282000},"page":"374-379","source":"Crossref","is-referenced-by-count":1,"title":["Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme"],"prefix":"10.1109","author":[{"given":"Benedikt","family":"Bock","sequence":"first","affiliation":[]},{"given":"Jan-Tobias","family":"Matysik","sequence":"additional","affiliation":[]},{"given":"Konrad-Felix","family":"Krentz","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.213"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2003.1214142"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2511301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7959"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8323"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278979"},{"key":"ref18","first-page":"13","article-title":"The ContikiMAC radio duty cycling protocol","volume":"t2011","author":"dunkels","year":"2011","journal-title":"Tech Rep"},{"article-title":"A survey of key distribution in wireless sensor networks","year":"2011","author":"chen","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"Tamper resistance - a cautionary note","author":"anderson","year":"1996","journal-title":"Proceedings of the Second Usenix Workshop on Electronic Commerce"},{"key":"ref6","article-title":"Key Revocation and Rekeying for the Adaptive Key Establishment Scheme","author":"werner","year":"2018","journal-title":"Master&#x2019;s thesis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-218-4_20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FGCN.2007.32"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_17"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.46586\/tches.v2018.i1.73-97","article-title":"EM analysis in the IoT context: lessons learned from an attack on Thread","author":"dinu","year":"2018"},{"article-title":"Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15. 4 Security: From Adaptive to Responsive","year":"2018","author":"krentz","key":"ref1"},{"key":"ref9","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Symposium on Security and Privacy"}],"event":{"name":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19)","start":{"date-parts":[[2019,4,15]]},"location":"Limerick, Ireland","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE 5th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764305\/8767167\/08767211.pdf?arnumber=8767211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:15Z","timestamp":1658094915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8767211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2019.8767211","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}