{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:28:09Z","timestamp":1725694089741},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,19]]},"DOI":"10.1109\/wpmc59531.2023.10338834","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T14:52:10Z","timestamp":1702306330000},"page":"76-82","source":"Crossref","is-referenced-by-count":1,"title":["Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms"],"prefix":"10.1109","author":[{"given":"Amar","family":"Rasheed","sequence":"first","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,TX,USA"}]},{"given":"Mohamed","family":"Baza","sequence":"additional","affiliation":[{"name":"College of Charleston,Dept. of Computer Science,Charleston,SC,USA"}]},{"given":"Mohammad","family":"Khan","sequence":"additional","affiliation":[{"name":"East Tennessee State University,Department of Computing,Johnson City,TN,USA"}]},{"given":"Narashimha","family":"Karpoor","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,TX,USA"}]},{"given":"Cihan","family":"Varol","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,TX,USA"}]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University,Department of Math &#x0026; Computer Science,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE52739.2021.9497501"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869292"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2022.3181510"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298139"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071261"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347247"},{"journal-title":"Freescale Semiconductor, Inc","key":"ref7","article-title":"CAN: Bosch Controller Area Network"},{"volume-title":"TinyJAMBU v2 Specification (nist.gov)","key":"ref8"},{"key":"ref9","article-title":"Advanced Encryption Standard (AES)","volume-title":"Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD","author":"Dworkin","year":"2001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24691-6_32"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIC51217.2021.9369812"},{"journal-title":"No. rfc3713. 2004","article-title":"A description of the Camellia encryption algorithm","author":"Mitsuru","key":"ref12"},{"volume-title":"St.com","key":"ref13","article-title":"Ultra-low-power with FPU Arm Cortex-M4 MCU 80 MHz with 1 Mbyte of Flash memory, LCD, USB OTG, DFSDM"},{"key":"ref14","article-title":"Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signaling"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCNS53852.2021.00016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE50968.2020.00068"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS56243.2022.10067294"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2017.7934878"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2019.00133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2019.00004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3128634"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774712"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2023.3312545"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23198223"}],"event":{"name":"2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC)","start":{"date-parts":[[2023,11,19]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2023,11,22]]}},"container-title":["2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10338831\/10338832\/10338834.pdf?arnumber=10338834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T17:53:13Z","timestamp":1703008393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10338834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wpmc59531.2023.10338834","relation":{},"subject":[],"published":{"date-parts":[[2023,11,19]]}}}