{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T04:27:30Z","timestamp":1648873650509},"reference-count":10,"publisher":"International Academy Publishing (IAP)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.7.8.1847-1852","type":"journal-article","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T10:57:43Z","timestamp":1346929063000},"source":"Crossref","is-referenced-by-count":3,"title":["Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks"],"prefix":"10.17706","volume":"7","author":[{"given":"Chunguang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jiuru","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,8,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14849-1_23"},{"key":"ref2","first-page":"41","article-title":"A key management scheme for distributed sensor networks","volume-title":"Proc. of the 9th ACM Conf. on Computer and Communications Security","author":"Eschenauer","year":"2002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1340771.1340777"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"issue":"11","key":"ref5","first-page":"49","article-title":"Broadcast authentication algorithm for wireless sensor networks","volume":"31","author":"Yao","year":"2010","journal-title":"J. Commun.","ISSN":"http:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/1641944.1641962","article-title":"Robust dynamic user authentication scheme for wireless sensor networks","volume-title":"Proc. of the 5th ACM symposium on QoS and security for wireless and mobile networks","author":"Vaidya","year":"2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2009.119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2006.012471"},{"key":"ref9","first-page":"274","volume-title":"\u201cOne-way accumulators: a decentralized alternative to digital signatures\u201d, Advances in Cryptology-Eurocrypt\u201993, LNCS765.","author":"Benaloh","year":"1993"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_45"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T10:32:10Z","timestamp":1643365930000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/6723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,1]]},"references-count":10,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2012,8,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.7.8.1847-1852","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,8,1]]}}}