{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:15:54Z","timestamp":1725509754292},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/wcnc.2011.5779232","type":"proceedings-article","created":{"date-parts":[[2011,5,27]],"date-time":"2011-05-27T13:26:46Z","timestamp":1306502806000},"page":"784-789","source":"Crossref","is-referenced-by-count":3,"title":["Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks"],"prefix":"10.1109","author":[{"given":"Aymen","family":"Boudguiga","sequence":"first","affiliation":[]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE Std 802 11–2007 Part 11 Wireless LAN MAC and Physical layer specifications","year":"2007","key":"ref10"},{"key":"ref11","article-title":"Extensible Authentication Protocol (EAP)","author":"aboba","year":"2004","journal-title":"RFC 3748 (Proposed Standard) Internet Engineering Task Force"},{"journal-title":"IEEE Std 802 1X-2004 Port Based Network Access Control","year":"2004","key":"ref12"},{"key":"ref13","article-title":"SEcure Neighbor Discovery (SEND)","author":"arkko","year":"2005","journal-title":"RFC 3971 (Proposed Standard)"},{"journal-title":"IEEE P802 11s\/D2 06 Part 11 Wireless LAN MAC and Physical Layer Specifications Amendment 10 Mesh Networking","year":"2009","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(03)00308-X"},{"key":"ref6","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology"},{"key":"ref5","first-page":"95","article-title":"A survey of identity-based cryptography","author":"baek","year":"2004","journal-title":"Proc of Australian Unix Users Group Annual Conference"},{"key":"ref8","first-page":"310","article-title":"Efficient identity based signature schemes based on pairings","author":"hess","year":"2003","journal-title":"SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020682"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"ref2"},{"key":"ref9","first-page":"1","article-title":"A wireless mesh network authentication method based on identity based signature","author":"wenju","year":"2009","journal-title":"Wireless Communications Networking and Mobile Computing 2009 WiCom '09 5th International Conference on"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"}],"event":{"name":"2011 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2011,3,28]]},"location":"Cancun, Mexico","end":{"date-parts":[[2011,3,31]]}},"container-title":["2011 IEEE Wireless Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5770420\/5779102\/05779232.pdf?arnumber=5779232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:32:33Z","timestamp":1490074353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5779232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2011.5779232","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}