{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:27:42Z","timestamp":1729664862551,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/wimob.2015.7348021","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:19:20Z","timestamp":1449595160000},"page":"627-634","source":"Crossref","is-referenced-by-count":2,"title":["An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds"],"prefix":"10.1109","author":[{"given":"Subhajit","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Chen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ala","family":"Altaweel","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Stoleru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-1-4613-0223-0_9"},{"key":"ref11","first-page":"5","article-title":"End-to-end pairwise key establishment using multi-path in wireless sensor network","volume":"3","author":"ling","year":"0","journal-title":"Global Telecommunications Conference 2005 GLOBECOM'05 IEEE"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.21236\/AD0705364","author":"harary","year":"1969","journal-title":"Graph Theory"},{"key":"ref13","volume":"3","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"ref14","first-page":"1","article-title":"The igraph software package for complex network research","volume":"1695","author":"csardi","year":"2006","journal-title":"InterJournal Complex Systems"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1109\/PERCOM.2005.18","article-title":"Energy analysis of public-key cryptography for wireless sensor networks","author":"wander","year":"2005","journal-title":"Pervasive Computing and Communications 2005 PerCom 2005 Third IEEE International Conference on"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-30496-8_2","article-title":"Public key cryptography in sensor networksrevisited","author":"gaubatz","year":"2005","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1180345.1180366"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","article-title":"A key-management scheme for distributed sensor networks","author":"eschenauer","year":"2002","journal-title":"Proceedings of the 9th ACM conference on Computer and communications security"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCChina.2013.6671198"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/NBiS.2012.122"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1810931.1810937"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/UCC.2011.45"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2491288.2491325"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ref2","article-title":"On secure shared key establishment for mobile devices using contextual information","author":"altaweel","year":"2015","journal-title":"Technical Report"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/990680.990707"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCC.2014.2326169"}],"event":{"name":"2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2015,10,19]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2015,10,21]]}},"container-title":["2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7332127\/7347915\/07348021.pdf?arnumber=7348021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T11:28:16Z","timestamp":1653737296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7348021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wimob.2015.7348021","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}