{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:34:23Z","timestamp":1729668863944,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/icc.2006.255641","type":"proceedings-article","created":{"date-parts":[[2006,12,18]],"date-time":"2006-12-18T20:41:18Z","timestamp":1166474478000},"page":"3663-3669","source":"Crossref","is-referenced-by-count":1,"title":["SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks"],"prefix":"10.1109","author":[{"given":"Jeff","family":"Janies","sequence":"first","affiliation":[]},{"given":"Chin-tser","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","article-title":"The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks","author":"stajano","year":"1999","journal-title":"AT&T Software Symposium"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015056"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510736"},{"key":"1","article-title":"One Way Accumulators: A Decentralized Alternative to Digital Signatures","volume":"765","author":"benaloh","year":"1993","journal-title":"Lecture Notes in Computer Science Springer"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"6","article-title":"Multi-level ?Tesla: A Broadcast Authentication System for Distributed Sensor Networks","author":"liu","year":"2003","journal-title":"Submitted for Review"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45811-5_29","article-title":"An Efficient Dynamic and Distributed Cryptographic Accumulator","volume":"2433","author":"goodrich","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"8","article-title":"Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks","author":"liu","year":"2003","journal-title":"Proc Network and Distributed System Security Symp (NDSS '03)"}],"event":{"name":"2006 IEEE International Conference on Communications","start":{"date-parts":[[2006,6,11]]},"location":"Istanbul","end":{"date-parts":[[2006,6,15]]}},"container-title":["2006 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4024074\/4024985\/04025042.pdf?arnumber=4025042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T12:22:57Z","timestamp":1497702177000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4025042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icc.2006.255641","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}