{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:50:25Z","timestamp":1760043025083},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/pimrc.2008.4699487","type":"proceedings-article","created":{"date-parts":[[2008,12,9]],"date-time":"2008-12-09T16:54:43Z","timestamp":1228841683000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Efficient access control for wireless sensor data"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Sorniotti","sequence":"first","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.152"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/69.979981"},{"journal-title":"D6 2-II Elderly Care Application In-depth scenarios and use cases","year":"2007","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2005.1557064"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"article-title":"incorporating temporal capabilities in existing key management schemes. cryptology eprint archive","year":"2007","author":"atallah","key":"3"},{"key":"2","first-page":"515","article-title":"incorporating temporal capabilities in existing key management schemes","author":"atallah","year":"2007","journal-title":"ESORICS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1145\/1128817.1128864","article-title":"an efficient broadcast authentication scheme in wireless sensor networks","author":"chang","year":"2006","journal-title":"ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information computer and communications security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"4","first-page":"1","article-title":"keying hash functions for message authentication","author":"bellare","year":"1996","journal-title":"Crypto"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.59"}],"event":{"name":"2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2008,9,15]]},"location":"Cannes, France","end":{"date-parts":[[2008,9,18]]}},"container-title":["2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications"],"original-title":[],"link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/4674453\/4699392\/04699487.pdf?arnumber=4699487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:34:35Z","timestamp":1497782075000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/4699487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":15,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1109\/pimrc.2008.4699487","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}