{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:28:36Z","timestamp":1729614516586,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/wincom.2017.8238203","type":"proceedings-article","created":{"date-parts":[[2017,12,25]],"date-time":"2017-12-25T16:50:05Z","timestamp":1514220605000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper)"],"prefix":"10.1109","author":[{"given":"Taha","family":"Belkhouja","sequence":"first","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Abdulla K.","family":"Al-Ali","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information Warfare and Security","year":"1998","author":"denning","key":"ref10"},{"journal-title":"A Classical Introduction to Cryptography","year":"2005","author":"vaudenay","key":"ref11"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/SSIR"},{"key":"ref14","article-title":"Unmasking a modulated chaotic communications scheme","author":"short","year":"1995","journal-title":"Int J Bifurcations Chaos"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20081052"},{"key":"ref4","article-title":"Security in Wireless Sensor Networks","author":"du","year":"2008","journal-title":"IEEE Wireless Communications Magazine"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2266116"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/s120201625","article-title":"Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks","author":"kumar","year":"2012","journal-title":"A Survey Sensors"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2013.2245664"},{"key":"ref7","article-title":"Security in Wireless Sensor Networks","volume":"15","author":"du","year":"2008","journal-title":"IEEE Wireless Communications Magazine"},{"key":"ref2","article-title":"A Survey of Access Control Schemes for Implantable Medical Devices","author":"wu","year":"2016","journal-title":"Proc 4th International on CEIT"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402005121"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01608556"},{"key":"ref21","article-title":"Dynamical Properties of the Hnon Mapping","volume":"6","author":"al-shameri","year":"2012","journal-title":"Int Journal of Math Analysis"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2010","key":"ref23"}],"event":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2017,11,1]]},"location":"Rabat","end":{"date-parts":[[2017,11,4]]}},"container-title":["2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8200356\/8238017\/08238203.pdf?arnumber=8238203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T13:52:31Z","timestamp":1570542751000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8238203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wincom.2017.8238203","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}