{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:52Z","timestamp":1750220812598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342039","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs\/IOT"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Akhtar","sequence":"first","affiliation":[{"name":"Department of Computer Science Comsats University Islamabad Pakistan"}]},{"given":"Majid","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, Comsats University, Islamabad, Pakistan"}]},{"given":"Jehangir","family":"Arshad","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Comsats University, Islamabad, Pakistan"}]},{"given":"Mudassar","family":"Ahmad","sequence":"additional","affiliation":[{"name":"National Textile, University Faisalabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"K. H. M. Wong Yuan Zheng Jiannong Cao and Shengwei Wang \"A Dynamic User Authentication Scheme for Wireless Sensor Networks \" pp. 244--251 2006.   K. H. M. Wong Yuan Zheng Jiannong Cao and Shengwei Wang \"A Dynamic User Authentication Scheme for Wireless Sensor Networks \" pp. 244--251 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Abid Ali Minhas, Mudassar Ahmad, Rehan Ashraf, Shehzad Khalid, Kijun Han, \"Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network\", Wireless Communication and Mobile Computing","author":"Jabbar Sohail","year":"2018","unstructured":"Sohail Jabbar , Muhammad Asif Habib , Abid Ali Minhas, Mudassar Ahmad, Rehan Ashraf, Shehzad Khalid, Kijun Han, \"Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network\", Wireless Communication and Mobile Computing , Hindawi and Wiley , 2018 . Sohail Jabbar, Muhammad Asif Habib, Abid Ali Minhas, Mudassar Ahmad, Rehan Ashraf, Shehzad Khalid, Kijun Han, \"Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network\", Wireless Communication and Mobile Computing, Hindawi and Wiley, 2018."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"issue":"8","key":"e_1_3_2_1_4_1","first-page":"4006","article-title":"Towards Designing Efficient Lightweight Ciphers for Internet of Things","volume":"11","author":"Tausif Muhammad","year":"2017","unstructured":"Muhammad Tausif , Javed Ferzund , Sohail Jabbar , Raheela Shahzadi , \" Towards Designing Efficient Lightweight Ciphers for Internet of Things \", KSII Transactions on Internet and Information Systems , Vol. 11 , No. 8 , Pages 4006 -- 4024 2017 . Muhammad Tausif, Javed Ferzund, Sohail Jabbar, Raheela Shahzadi, \"Towards Designing Efficient Lightweight Ciphers for Internet of Things\", KSII Transactions on Internet and Information Systems, Vol. 11, No. 8, Pages 4006--4024 2017.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"P. Kumar and H.-J. Lee \"Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks \" in 2011 Wireless Advanced 2011 pp. 241--245.  P. Kumar and H.-J. Lee \"Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks \" in 2011 Wireless Advanced 2011 pp. 241--245.","DOI":"10.1109\/WiAd.2011.5983262"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s110504767"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120201625"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0346-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0285-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0404-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.032"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1214"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-015-0476-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0346-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0485-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/s130809589"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2585081"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.11.002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2851722"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2673"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-016-0345-8"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.010"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1558"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0720-9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.016"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:58Z","timestamp":1750201978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":32,"alternative-id":["10.1145\/3341325.3342039","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342039","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}