{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:55:30Z","timestamp":1725472530677},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/cis.2007.227","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:33Z","timestamp":1199462373000},"page":"833-837","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Authentication Strategy for Reprogramming of Sensor Networks"],"prefix":"10.1109","author":[{"given":"Jin","family":"Tan","sequence":"first","affiliation":[]},{"given":"JinTan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"YanQiu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICDCS.2006.77"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICDCS.2005.50"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1006\/inco.2000.2916"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1127777.1127822"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1127777.1127826"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SECPRI.2004.1301329"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MWC.2004.1368895"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1031495.1031506"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/11601494_3","article-title":"Remote software-based attestation for wireless sensors","author":"shaneck","year":"2005","journal-title":"Proc 2nd European Workshop Security Ad-Hoc Sensor Networks (ESAS)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MNET.2006.1637932"}],"event":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","start":{"date-parts":[[2007,12,15]]},"location":"Harbin, China","end":{"date-parts":[[2007,12,19]]}},"container-title":["2007 International Conference on Computational Intelligence and Security (CIS 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4415275\/4415276\/04415463.pdf?arnumber=4415463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:40:36Z","timestamp":1497739236000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4415463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cis.2007.227","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}