{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:12Z","timestamp":1750307832051,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T00:00:00Z","timestamp":1212105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,30]]},"DOI":"10.1145\/1374699.1374711","type":"proceedings-article","created":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T13:51:31Z","timestamp":1247665891000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Public key based authentication for secure integration of sensor data and RFID"],"prefix":"10.1145","author":[{"given":"Mingyan","family":"Li","sequence":"first","affiliation":[{"name":"Boeing Phantom Works, Seattle, USA"}]},{"given":"Casey","family":"Fung","sequence":"additional","affiliation":[{"name":"Boeing Phantom Works, Seattle, USA"}]},{"given":"Krishna","family":"Sampigethaya","sequence":"additional","affiliation":[{"name":"Boeing Phantom Works, Seattle, USA"}]},{"given":"Richard","family":"Robinson","sequence":"additional","affiliation":[{"name":"Boeing Phantom Works, Seattle, USA"}]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, USA"}]},{"given":"Rainer","family":"Falk","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, Munich, Germany"}]},{"given":"Florian","family":"Kohlmayer","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, Munich, Germany"}]},{"given":"Andreas","family":"Koepf","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of SDR forum Technical conference","author":"Falk R.","year":"2007","unstructured":"R. Falk , F. Kohlmayer , A. Koepf , M. Li , High-assured SDR-based avionics RFID system , In Proceedings of SDR forum Technical conference , ( Denver, Colorado, November 6-9) , 2007 R. Falk, F. Kohlmayer, A. Koepf, M. Li, High-assured SDR-based avionics RFID system, In Proceedings of SDR forum Technical conference, (Denver, Colorado, November 6-9), 2007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080164"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song , Random key pre-distribution schemes for sensor networks , In Proceedings of IEEE Symposium on Security and Privacy , ( Berkeley, California, May 11-14) , 2003 H. Chan, A. Perrig, and D. Song, Random key pre-distribution schemes for sensor networks, In Proceedings of IEEE Symposium on Security and Privacy, (Berkeley, California, May 11-14), 2003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. Falk F. Kohlmayer A. Koepf M. Braun H. Seuschek M. Li Application of passive asymmetric RFID tags in high assurance avionics multi-domain RFID processing system in submission to European RFID workshop 2008  R. Falk F. Kohlmayer A. Koepf M. Braun H. Seuschek M. Li Application of passive asymmetric RFID tags in high assurance avionics multi-domain RFID processing system in submission to European RFID workshop 2008","DOI":"10.1109\/RFID.2008.4519362"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of AIAA ATIO Conference, (Belfast, Northern Ireland, September 18-20)","author":"Robinson R.","year":"2007","unstructured":"R. Robinson , M. Li , S. Lintelman , K. Sampigethaya , R. Poovendran , D. von Oheimb , and J.- U. Bu\u00dfer, Impact of public key enabled application on the operation and maintenance of commercial airplanes , In Proceedings of AIAA ATIO Conference, (Belfast, Northern Ireland, September 18-20) , 2007 R. Robinson, M. Li, S. Lintelman, K. Sampigethaya, R. Poovendran, D. von Oheimb, and J.-U. Bu\u00dfer, Impact of public key enabled application on the operation and maintenance of commercial airplanes, In Proceedings of AIAA ATIO Conference, (Belfast, Northern Ireland, September 18-20), 2007"},{"key":"e_1_3_2_1_8_1","volume-title":"509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP","author":"IETF","year":"1999","unstructured":"IETF Draft 2560: X. 509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999 . http:\/\/tools.ietf.org\/html\/rfc2560 IETF Draft 2560: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, 1999. http:\/\/tools.ietf.org\/html\/rfc2560"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292834"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 1st Annual PKI Research Workshop","author":"Micali S.","year":"2002","unstructured":"S. Micali , NOVO MODO - Scalable Certificate validation and simplified PKI management , In Proceedings of the 1st Annual PKI Research Workshop , 2002 . S. Micali, NOVOMODO - Scalable Certificate validation and simplified PKI management, In Proceedings of the 1st Annual PKI Research Workshop, 2002."}],"event":{"name":"MobiHoc08: The Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Hong Kong Hong Kong, China","acronym":"MobiHoc08"},"container-title":["Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374699.1374711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1374699.1374711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:56Z","timestamp":1750255076000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374699.1374711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,30]]},"references-count":10,"alternative-id":["10.1145\/1374699.1374711","10.1145\/1374699"],"URL":"https:\/\/doi.org\/10.1145\/1374699.1374711","relation":{},"subject":[],"published":{"date-parts":[[2008,5,30]]},"assertion":[{"value":"2008-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}