{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:22Z","timestamp":1750220662964,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1145\/3416013.3426447","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T18:52:52Z","timestamp":1606243972000},"page":"29-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Memory-efficient Group Key Managment for Communicating Things"],"prefix":"10.1145","author":[{"given":"Hicham","family":"Lakhlef","sequence":"first","affiliation":[{"name":"Sorbonne University, University of Technology of Compiegne, Compiegne, France"}]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[{"name":"Sorbonne University, University of Technology of Compiegne, Compiegne, France"}]},{"given":"Fabio","family":"D'Andreagiovanni","sequence":"additional","affiliation":[{"name":"Sorbonne University, University of Technology of Compiegne &amp; National Center for Scientific Research (CNRS), Compiegne, France"}]}],"member":"320","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"199","article-title":"Internet of things security: A top-down survey Comput","volume":"141","author":"Kouicem D.","year":"2018","unstructured":"D. Kouicem , A. Bouabdallah , H. Lakhlef : Internet of things security: A top-down survey Comput . Networks 141 : 199 -- 221 , 2018 D. Kouicem, A. Bouabdallah, H. Lakhlef : Internet of things security: A top-down survey Comput. Networks 141: 199--221, 2018","journal-title":"Networks"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Internet of Things for Smart Cities","author":"Zanella A.","year":"2014","unstructured":"A. Zanella , N. Bui , A. Castellani , L. Vangelista , and M. Zorzi : Internet of Things for Smart Cities , IEEE Internet of Things Journal , V . 1 , No. 1, 2014 A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi : Internet of Things for Smart Cities, IEEE Internet of Things Journal, V. 1, No. 1, 2014","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2889688"},{"key":"e_1_3_2_1_4_1","first-page":"3455","volume-title":"11th World Congress on. IEEE","author":"Bao X.","year":"2014","unstructured":"X. Bao , J. Liu , L. She and S. Zhang : A key managementscheme based on grouping within cluster. In: Intelligent Control and Automation , 11th World Congress on. IEEE , pp. 3455 -- 3460 , 2014 X. Bao, J. Liu, L. She and S. Zhang : A key managementscheme based on grouping within cluster. In: Intelligent Control and Automation, 11th World Congress on. IEEE, pp. 3455--3460, 2014"},{"key":"e_1_3_2_1_5_1","first-page":"3","article-title":"GREP: A group rekeying protocol based on member join history. IEEE Symposium on Computers and Communication","volume":"5090","author":"Tiloca M.","year":"2016","unstructured":"M. Tiloca , G. Dini : GREP: A group rekeying protocol based on member join history. IEEE Symposium on Computers and Communication , ISBN 978--1-- 5090-0679 -- 3 , 2016 M. Tiloca, G. Dini: GREP: A group rekeying protocol based on member join history. IEEE Symposium on Computers and Communication, ISBN 978--1--5090-0679--3, 2016","journal-title":"ISBN 978--1--"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830566"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2014.08.02"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.12.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"e_1_3_2_1_10_1","first-page":"118","volume-title":"IEEE 22nd Pacific Rim International Symposium on.","author":"Tsai I.","year":"2017","unstructured":"I. Tsai , C. Yu , H. Yokota and S. Kuo . : Key Management in Internet of Things via Kronecker Product. Dependable Computing , IEEE 22nd Pacific Rim International Symposium on. pp. 118 -- 124 , 2017 I. Tsai, C. Yu, H. Yokota and S. Kuo. : Key Management in Internet of Things via Kronecker Product. Dependable Computing, IEEE 22nd Pacific Rim International Symposium on. pp. 118--124, 2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.04.006"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.023"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.019"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3047413"},{"key":"e_1_3_2_1_15_1","volume-title":"Challal: A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things J. Netw. Comput. Appl. 150","author":"Kandi M.","year":"2020","unstructured":"M. Kandi , H. Lakhlef , A. Bouabdallah , Y. Challal: A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things J. Netw. Comput. Appl. 150 , 2020 M. Kandi, H. Lakhlef, A. Bouabdallah, Y. Challal: A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things J. Netw. Comput. Appl. 150, 2020"},{"key":"e_1_3_2_1_16_1","volume-title":"Indian Journal of Science and Technology 10.13","author":"Singh S.R.","year":"2017","unstructured":"S.R. Singh , A.K. Khan , and T.S. Singh . : A New Key ManagementScheme for Wireless Sensor Networks using an Elliptic Curve . In: Indian Journal of Science and Technology 10.13 , 2017 S.R. Singh, A.K. Khan, and T.S. Singh. : A New Key ManagementScheme for Wireless Sensor Networks using an Elliptic Curve. In: Indian Journal of Science and Technology 10.13, 2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2017.7885817"},{"key":"e_1_3_2_1_18_1","first-page":"371","article-title":"Effective key management in dynamic wireless sensor networks. In","author":"Seo S.H.","year":"2015","unstructured":"S.H. Seo , J. Won , S. Sultana and E. Bertino : Effective key management in dynamic wireless sensor networks. In : IEEE Transactions on Information Forensics and Security , pp. 371 -- 383 , 2015 S.H. Seo, J. Won, S. Sultana and E. Bertino : Effective key management in dynamic wireless sensor networks. In: IEEE Transactions on Information Forensics and Security, pp. 371--383, 2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31020-1_41"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.176"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2006.9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/URKE.2011.6007810"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/URKE.2011.6007808"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322777"}],"event":{"name":"MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Alicante Spain","acronym":"MSWiM '20"},"container-title":["Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416013.3426447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3416013.3426447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:44Z","timestamp":1750197764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416013.3426447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":25,"alternative-id":["10.1145\/3416013.3426447","10.1145\/3416013"],"URL":"https:\/\/doi.org\/10.1145\/3416013.3426447","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2020-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}