{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:13:26Z","timestamp":1742386406510},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540311584"},{"type":"electronic","value":"9783540324355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11610496_52","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T07:10:24Z","timestamp":1135149024000},"page":"397-404","source":"Crossref","is-referenced-by-count":3,"title":["Low Energy Consumption Security Method for Protecting Information of Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Jaemyung","family":"Hyun","sequence":"first","affiliation":[]},{"given":"Sungsoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Akyildiz, L., et al.: A Survey on Sensor Networks. IEEE Communications Magazine, 102\u2013114 (2002)","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Perring, A., et al.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"52_CR3","unstructured":"Yin, C., et al.: Secure Routing for Large-scale Wireless Sensor Networks. In: Proceedings of the International Conference on Communication Technology (2003)"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Ganeasn, P., et al.: Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In: Proceedings of ACM Workshop on Wireless Sensor Networks and Applications, pp. 151\u2013159 (2003)","DOI":"10.1145\/941350.941372"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Cam, H., et al.: Energy-Efficient Security protocol for Wireless Sensor Networks. In: Proceedings of IEEE VTC Fall 2003 Conference (2003)","DOI":"10.1109\/VETECF.2003.1286170"},{"key":"52_CR6","unstructured":"Cam, H., et al.: Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks. In: Proceeding of IEEE International Performance Computing and Communications Conference (2005)"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Capkun, S., et al.: GPS-free Positioning in Mobile Ad-Hoc Networks. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences, pp. 1\u201310 (2001)","DOI":"10.1109\/HICSS.2001.927202"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Patwari, N., et al.: Relative Location Estimation in Wireless Sensor Networks. IEEE Transactions on Signal Processing, Special Issue on Signal Processing in Networks, 2137\u20132148 (2003)","DOI":"10.1109\/TSP.2003.814469"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Barbeau, M., et al.: Improving Distance Based Geographic Location Techniques in Sensor Networks. In: International Conference on Ad Hoc Networks and Wireless, pp. 197\u2013210 (2004)","DOI":"10.1007\/978-3-540-28634-9_16"},{"key":"52_CR10","volume-title":"Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems","author":"J. Beutel","year":"2004","unstructured":"Beutel, J.: Location Management in Wireless Sensor Networks. In: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems. CRC Press, Boca Raton (2004)"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Slijepcevic, S., et al.: On Communication Security in Wireless Ad-Hoc Sensor Networks. In: 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139\u2013144 (2002)","DOI":"10.1109\/ENABL.2002.1030000"},{"key":"52_CR12","unstructured":"Park, S., Kim, S.: Self-Protection Scheme in Sensor Network with Autonomic Computing. Technical Report, Ajou University (2004)"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11610496_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T19:34:11Z","timestamp":1683315251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11610496_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540311584","9783540324355"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11610496_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}