{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:11:38Z","timestamp":1758845498319,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ftirma Kurumu","doi-asserted-by":"publisher","award":["115E827"],"award-info":[{"award-number":["115E827"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/tii.2019.2950465","type":"journal-article","created":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T20:21:34Z","timestamp":1572466894000},"page":"703-714","source":"Crossref","is-referenced-by-count":9,"title":["A Hybrid Key Generation and a Verification Scheme"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7188-2619","authenticated-orcid":false,"given":"Gunes Karabulut","family":"Kurt","sequence":"first","affiliation":[{"name":"Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0806-5506","authenticated-orcid":false,"given":"Yalda","family":"Khosroshahi","sequence":"additional","affiliation":[{"name":"Informatics Institute, Istanbul Technical University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8130-8178","authenticated-orcid":false,"given":"Enver","family":"Ozdemir","sequence":"additional","affiliation":[{"name":"Informatics Institute, Istanbul Technical University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3734-3133","authenticated-orcid":false,"given":"Nasim","family":"Tavakkoli","sequence":"additional","affiliation":[{"name":"Informatics Institute, Istanbul Technical University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4640-7020","authenticated-orcid":false,"given":"Ozan Alp","family":"Topal","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, Turkey"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2006496"},{"journal-title":"Elliptic Curves Number Theory and Cryptography","year":"2003","author":"washington","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2005.1580281"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2552165"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806423"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056941"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2016.7536825"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(85)90078-7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-6333-3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2691003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref13","volume":"2","author":"rappaport","year":"1996","journal-title":"et\ufffdal"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2006.346462"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"ye","year":"2010","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700839"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1109\/TII.2014.2306391","article-title":"IoT-based configurable information service platform for product lifecycle management","volume":"10","author":"cai","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055356"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2307795"},{"key":"ref6","article-title":"How to build a safer Internet of Things","volume":"2","author":"haryandini","year":"2015","journal-title":"IEEE Spectr"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2471179"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800455"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/e19080420"},{"key":"ref7","article-title":"The Internet of Things: Five critical questions","volume":"2","year":"2015","journal-title":"McKinsey Global Institute"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2299233"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"The Industrial Internet of Things","year":"2017","author":"geng","key":"ref1"},{"key":"ref20","first-page":"156","article-title":"Provably secure password-authenticated key exchange using Diffie&#x2013;Hellman","author":"boyko","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptogr Techn"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888553"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2310747"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2868714"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2837661"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2740290"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8952812\/08887260.pdf?arnumber=8887260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:45:38Z","timestamp":1705355138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8887260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2950465","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}