{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:46Z","timestamp":1750307626828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":2,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1454586.1454608","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:35Z","timestamp":1225196315000},"page":"113-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient security algorithm in mobile computing for resource constrained mobile devices."],"prefix":"10.1145","author":[{"given":"Janet","family":"Light","sequence":"first","affiliation":[{"name":"University of New Brunswick (Saint John), Saint John, NB, Canada"}]},{"given":"Deepika","family":"David","sequence":"additional","affiliation":[{"name":"UNB, Saint John, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kumar S. Girimondo M. Weimerskirch A. Paar C. Patel A. Wander S. \"Embedded end-to-end wireless security with ECDH key exchange\" the 46th IEEE Midwest Symposium On Circuits and Systems 2003.  Kumar S. Girimondo M. Weimerskirch A. Paar C. Patel A. Wander S. \"Embedded end-to-end wireless security with ECDH key exchange\" the 46th IEEE Midwest Symposium On Circuits and Systems 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756142"}],"event":{"name":"MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver British Columbia Canada","acronym":"MSWiM '08"},"container-title":["Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454586.1454608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454586.1454608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:54Z","timestamp":1750250754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454586.1454608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":2,"alternative-id":["10.1145\/1454586.1454608","10.1145\/1454586"],"URL":"https:\/\/doi.org\/10.1145\/1454586.1454608","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}