{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T06:06:54Z","timestamp":1749794814333},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/ifipnetworking.2017.8264846","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:40:12Z","timestamp":1516660812000},"page":"1-9","source":"Crossref","is-referenced-by-count":13,"title":["SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks"],"prefix":"10.23919","author":[{"given":"Milan","family":"Schmittner","sequence":"first","affiliation":[]},{"given":"Arash","family":"Asadi","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SEMUD source code","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2416002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036830"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.07.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref35","article-title":"Secure routing for mobile ad hoc networks","author":"papadimitratos","year":"2002","journal-title":"SCS Communication Networks and Distributed Systems Modeling and Simulation Conference"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2230337"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462115"},{"journal-title":"Modeling multi-mode D2D communications in LTE","year":"2014","author":"asadi","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2277963"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23090"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523512"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10649-1_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807943"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1506-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524372"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470950"},{"key":"ref6","article-title":"A survey on security in D2D communications","author":"wang","year":"2016","journal-title":"Mobile Networks and Applications"},{"key":"ref29","article-title":"Preparation of a Nexus 5 Android Smartphone for Power Analysis","author":"schulz","year":"2016","journal-title":"Tech Rep"},{"key":"ref5","article-title":"Practical Attacks Against Privacy and Availability in 4G\/LTE Mobile Communication Systems","author":"shaik","year":"2015","journal-title":"NDSS"},{"journal-title":"TR 33 303 V13 3 0","article-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Proximity-based Services (ProSe); Security aspects (Release 13)","year":"2016","key":"ref8"},{"journal-title":"TR 23 303 V13 0 0","article-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Proximity-based services (ProSe); Stage 2 (Release 13)","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807947"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2330818"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063572"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"journal-title":"APU platform","year":"0","key":"ref22"},{"journal-title":"ALIX platform","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_28"},{"journal-title":"The Sodium crypto library (libsodium)","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375849"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"}],"event":{"name":"2017 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2017,6,12]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253906\/8264823\/08264846.pdf?arnumber=8264846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T03:08:46Z","timestamp":1518059326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8264846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2017.8264846","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}