{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:07:46Z","timestamp":1729631266409,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.16","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"94-101","source":"Crossref","is-referenced-by-count":3,"title":["Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach"],"prefix":"10.1109","author":[{"given":"Aymen","family":"Boudguiga","sequence":"first","affiliation":[]},{"given":"Alexis","family":"Olivereau","sequence":"additional","affiliation":[]},{"given":"Nouha","family":"Oualha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2002","author":"daemen","doi-asserted-by":"crossref","journal-title":"The Design of Rijndael","key":"13","DOI":"10.1007\/978-3-662-04722-4"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1023\/A:1016598314198"},{"year":"2007","author":"bersani","journal-title":"RFC 4764 (Experimental) Internet Engineering Task Force","article-title":"The eap-psk protocol: A pre-shared key extensible authentication protocol (eap) method","key":"12"},{"year":"1993","author":"kohl","journal-title":"Internet Engineering Task Force RFC-1510","article-title":"The kerberos network authentication service (v5)","key":"3"},{"year":"2011","author":"mattsson","journal-title":"RFC 6043 (Informational) Internet Engineering Task Force","article-title":"Mikey-ticket: Ticket-based modes of key distribution in multimedia internet keying (mikey)","key":"2"},{"year":"2004","author":"arkko","journal-title":"RFC 3830 (Proposed Standard) Internet Engineering Task Force","article-title":"Mikey: Multimedia internet keying","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ICADE.2012.6330115"},{"year":"1983","author":"dolev","journal-title":"On the security of public key protocols","first-page":"198","key":"7"},{"year":"1997","author":"krawczyk","journal-title":"Internet Engineering Task Force RFC 2104","article-title":"Hmac: Keyed-hashing for message authentication","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","article-title":"Automatic verification of correspondences for security protocols","volume":"17","author":"blanchet","year":"2009","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/24592.24594"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/948117.948120"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/978-3-540-72163-5_24"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680828.pdf?arnumber=6680828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T21:37:59Z","timestamp":1564954679000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.16","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}