{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:46:59Z","timestamp":1772808419126,"version":"3.50.1"},"reference-count":9,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017052","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T01:01:24Z","timestamp":1512003684000},"page":"715-717","source":"Crossref","is-referenced-by-count":1,"title":["An active attack on a distributed Group Key Exchange system"],"prefix":"10.3934","volume":"11","author":[{"given":"Mohamed","family":"Baouch","sequence":"first","affiliation":[]},{"given":"Juan Antonio","family":"L\u00f3pez-Ramos","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Almeria, Ctra. Sacramento s\/n, 04120 Almeria, Spain"}]},{"given":"Blas","family":"Torrecillas","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Almeria, Ctra. Sacramento s\/n, 04120 Almeria, Spain"}]},{"given":"Reto","family":"Schnyder","sequence":"additional","affiliation":[{"name":"Institute of Mathematics, University of Zurich, Winterthurerstrasse 190, 8057 Zurich, Switzerland"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017052-1"},{"key":"key-10.3934\/amc.2017052-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.01.003"},{"key":"key-10.3934\/amc.2017052-3"},{"key":"key-10.3934\/amc.2017052-4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.872575"},{"key":"key-10.3934\/amc.2017052-5"},{"key":"key-10.3934\/amc.2017052-6","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"key-10.3934\/amc.2017052-7","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"key-10.3934\/amc.2017052-8","doi-asserted-by":"publisher","unstructured":"J. Van der Merwe, D. Dawoud and S. McDonald, A survey on peer-to-peer key management for mobile ad hoc networks, <i>ACM Computing Surveys<\/i>, <b>39<\/b> (2007).","DOI":"10.1145\/1216370.1216371"},{"key":"key-10.3934\/amc.2017052-9","unstructured":"S. -H. Yang,  <i>Wireless Sensor Networks. Principles, Desing and Applications<\/i>, Springer-Verlag, London, 2014."}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_4_715.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:05:17Z","timestamp":1772791517000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017052","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}