{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:09Z","timestamp":1750308009562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T00:00:00Z","timestamp":1151884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,3]]},"DOI":"10.1145\/1143549.1143586","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"177-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Low-power group key agreement for heterogeneous wireless networks"],"prefix":"10.1145","author":[{"given":"Joseph Chee Ming","family":"Teo","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Chik How","family":"Tan","sequence":"additional","affiliation":[{"name":"Gj\u00f8vik University College"}]},{"given":"Jim Mee","family":"Ng","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2006,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053443"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE CAS Workshop on Wireless Communication and Networking","author":"Hodjat A.","year":"2002","unstructured":"A. Hodjat and I. Verbauwhede , \" The energy cost of secrets in ad-hoc networks,\" in Proc . IEEE CAS Workshop on Wireless Communication and Networking , September 2002 . A. Hodjat and I. Verbauwhede, \"The energy cost of secrets in ad-hoc networks,\" in Proc. IEEE CAS Workshop on Wireless Communication and Networking, September 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022241315935"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Scalable protocols for authenticated group key exchange,\" In Advances in Cryptography - Crypto'03","author":"Katz J.","year":"2003","unstructured":"J. Katz and M. Yung , \" Scalable protocols for authenticated group key exchange,\" In Advances in Cryptography - Crypto'03 , Lecture Notes in Computer Science Vol. 2729 , pp. 110 -- 125 , 2003 . J. Katz and M. Yung, \"Scalable protocols for authenticated group key exchange,\" In Advances in Cryptography - Crypto'03, Lecture Notes in Computer Science Vol. 2729, pp. 110--125, 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J.\n      Nam S.\n      Cho S.\n      Kim and \n      D.\n      Won \"\n  Simple and Efficient Group Key Agreement Based on Factoring \" Proc. of ICCSA\n  2004 Lecture Notes in Computer Science Vol\n  . 3043 pp.\n  645\n  --\n  654 2004.  J. Nam S. Cho S. Kim and D. Won \"Simple and Efficient Group Key Agreement Based on Factoring \" Proc. of ICCSA 2004 Lecture Notes in Computer Science Vol. 3043 pp.645--654 2004.","DOI":"10.1007\/978-3-540-24707-4_76"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089803.1089975"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"}],"event":{"name":"IWCMC06: 2006 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Vancouver British Columbia Canada","acronym":"IWCMC06"},"container-title":["Proceedings of the 2006 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143549.1143586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:34Z","timestamp":1750259194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,3]]},"references-count":12,"alternative-id":["10.1145\/1143549.1143586","10.1145\/1143549"],"URL":"https:\/\/doi.org\/10.1145\/1143549.1143586","relation":{},"subject":[],"published":{"date-parts":[[2006,7,3]]},"assertion":[{"value":"2006-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}