{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:52:57Z","timestamp":1725954777264},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450426","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T18:00:16Z","timestamp":1535652016000},"page":"944-949","source":"Crossref","is-referenced-by-count":6,"title":["Effects of Wireless Power Transfer on LoRaWAN Join Procedure"],"prefix":"10.1109","author":[{"given":"Syed Muhammad","family":"Danish","sequence":"first","affiliation":[]},{"given":"Hassaan Khaliq","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Sobia","family":"Jangsher","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Lestas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506590"},{"journal-title":"Understanding the Limits of Lo-RaWAN","year":"2016","author":"adelantado","key":"ref13"},{"key":"ref14","article-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","author":"barker","year":"2016","journal-title":"NIST DRAFT Special Publication 800-90B Second Draft"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.020914.130825"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2725259"},{"key":"ref6","article-title":"Security Analysis of LoRaWANTM Join Procedure for Intemet of Things Networks","author":"tomasin","year":"2017","journal-title":"IEEE Wireless Commun Netw Conf Workshop (WCNCW)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2514106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422721"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957150"},{"journal-title":"Will Be in Use in 2020","year":"2017","key":"ref1"},{"year":"0","key":"ref9"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2018,6,25]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450426.pdf?arnumber=8450426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:58:01Z","timestamp":1643198281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450426","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}