{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:00:23Z","timestamp":1757451623970},"publisher-location":"Berlin\/Heidelberg","reference-count":36,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540238670"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-27139-2_10","type":"book-chapter","created":{"date-parts":[[2005,12,9]],"date-time":"2005-12-09T11:46:11Z","timestamp":1134128771000},"page":"199-221","source":"Crossref","is-referenced-by-count":7,"title":["Security for Ambient Intelligent Systems"],"prefix":"10.1007","author":[{"given":"I.","family":"Verbauwhede","sequence":"first","affiliation":[]},{"given":"A.","family":"Hodjat","sequence":"additional","affiliation":[]},{"given":"D.","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"B.-C.","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"R. Anderson, \u201cSecurity engineering: a guide to building dependable distributed systems,\u201d Wiley 2001.","key":"10_CR1"},{"doi-asserted-by":"crossref","unstructured":"S. Basagni, K. Herrin, E. Rosti, D. Bruschi, \u201cSecure pebblenets,\u201d Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHOC 2001), pp. 156\u2013163, Oct. 2001.","key":"10_CR2","DOI":"10.1145\/501416.501438"},{"doi-asserted-by":"crossref","unstructured":"R. Comerford, \u201cNo longer in denial,\u201d IEEE Spectrum, pg. 59\u201361, January 2001.","key":"10_CR3","DOI":"10.1109\/6.901143"},{"doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, The design of Rijndael, Springer-Verlag, 2002.","key":"10_CR4","DOI":"10.1007\/978-3-662-04722-4"},{"unstructured":"D. Dittrich, \u201cDistributed Denial of Service (DDoS) attacks\/tools resource page,\u201d http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/, 2004.","key":"10_CR5"},{"doi-asserted-by":"crossref","unstructured":"L. Eschenauer, V. D. Gligor, \u201cA key-management scheme for distributed sensor networks,\u201d Proc. 9th ACM Conference on Computer and Communications security (CCS\u2019 02), pp. 41\u201347, Nov. 2002.","key":"10_CR6","DOI":"10.1145\/586110.586117"},{"doi-asserted-by":"crossref","unstructured":"S. Fluhrer, I. Mantin, A. Shamir, \u201cWeaknesses in the Key Scheduling algorithm of RC4\u201d, 8th Annual workshop on selected areas in cryptography, Aug. 2001, LNCS 2259.","key":"10_CR7","DOI":"10.1007\/3-540-45537-X_1"},{"doi-asserted-by":"crossref","unstructured":"L. Goubin, J. Patarin, \u201cDES and Differential Power Analysis: The \u201cDuplication\u201d Method,\u201d Proc. CHES 1999, LNCS 1717, pg. 158, Jan. 1999.","key":"10_CR8","DOI":"10.1007\/3-540-48059-5_15"},{"unstructured":"A. Hodjat, I. Verbauwhede, \u201cThe energy cost of secrets in Ad-Hoc networks\u201d IEEE CAS workshop on Wireless Communication and Networking, Pasadena, CA, Sept. 2002.","key":"10_CR9"},{"doi-asserted-by":"crossref","unstructured":"J.-P. Hubaux, L. Buttyan, S. Capkun, \u201cThe quest for security in mobile ad hoc networks,\u201d Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHOC 2001), pp. 156\u2013163, Oct. 2001.","key":"10_CR10","DOI":"10.1145\/501416.501437"},{"doi-asserted-by":"crossref","unstructured":"D. Hwang, B.-C. Lai, I. Verbauwhede, \u201cEnergy-Memory-Security Trade-offs in distributed sensor networks,\u201d Proc. 3rd International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2004), Springer-Verlag LNCS 3158, pp. 70\u201381, July 2004.","key":"10_CR11","DOI":"10.1007\/978-3-540-28634-9_6"},{"doi-asserted-by":"crossref","unstructured":"IEEE P1363\/D1, Standard specification for Public-Key cryptography, November 1999.","key":"10_CR12","DOI":"10.1007\/978-1-4615-5207-9_1"},{"doi-asserted-by":"crossref","unstructured":"S. Janssens, J. Thomas, W. Borremans, P. Gijsels, I. Verbauwhede, F. Vercauteren, B. Preneel, J. Vandewalle, \u201cHardware-software co-design of an elliptic curve public-key cryptosystem,\u201d IEEE Workshop on Signal Processing Systems (SIPS2001), Antwerp, Belgium, Sept. 2001.","key":"10_CR13","DOI":"10.1109\/SIPS.2001.957349"},{"doi-asserted-by":"crossref","unstructured":"B. Kienhuis et. al, \u201cA Methodology to design programmable embedded systems,\u201d LNCS, Vol. 2268, Nov. 2001.","key":"10_CR14","DOI":"10.1007\/3-540-45874-3_2"},{"doi-asserted-by":"crossref","unstructured":"P. Kocher, \u201cTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,\u201d Advances in Cryptology, Proceedings Crypto\u201996, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 146\u2013158.","key":"10_CR15","DOI":"10.1007\/3-540-68697-5_9"},{"doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun, \u201cDifferential power analysis,\u201d M. Wiener (Ed.), CRYPTO 1999 Proceed-ings, LNCS 1666, Springer-Verlag, 1999.","key":"10_CR16","DOI":"10.1007\/3-540-48405-1_25"},{"doi-asserted-by":"crossref","unstructured":"A. Lenstra, E. Verheul, \u201cSelecting cryptographic key sizes,\u201d International workshop on Practice and Theory in public key cryptography, PKC2000, Jan. 2000.","key":"10_CR17","DOI":"10.1007\/978-3-540-46588-1_30"},{"unstructured":"H. Lipmaa, \u201cAES\/Rijndael: speed\u201d http:\/\/www.tcs.hut.fi\/~helger\/aes\/rijndael.html.","key":"10_CR18"},{"unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, \u201cHandbook of Applied Cryptography,\u201d CRC Press, 1997.","key":"10_CR19"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T. Messerges","year":"2002","unstructured":"T. Messerges, E. Dabbish and R. Sloan, \u201cExamining Smart-Card Security under the Threat of Power Analysis Attacks,\u201d IEEE Transactions on Computers, Vol. 51, pg. 541\u2013552, April 2002.","journal-title":"IEEE Transactions on Computers"},{"doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, \u201cSPINS: Security protocols for sensor networks,\u201d Proc. 7th ACM Mobile Computing and Networks (MobiCom 2001), pp. 189\u2013199, July 2001.","key":"10_CR21","DOI":"10.1145\/381677.381696"},{"doi-asserted-by":"crossref","unstructured":"J. Rabaey, \u201cWireless beyond the Third generation \u2014 Facing the energy challenge\u201d, Proc. of the 2001 International symposium on Low Power Electronics and Design,\u201d pp. 1\u20133, August 2001.","key":"10_CR22","DOI":"10.1109\/LPE.2001.945361"},{"unstructured":"J. Rabaey, A. Chandrakasan, B. Nikolic, \u201cDigital Integrated Circuits: A design perspective, 2nd edition\u201d Prentice Hall, 2003.","key":"10_CR23"},{"doi-asserted-by":"crossref","unstructured":"V. Raghunathan, C. Schurgers, S. Park, M. Srivastava, \u201cEnergy-Aware Wireless micro-sensor networks,\u201d IEEE Signal Processing magazine, pg. 40\u201350, March 2002.","key":"10_CR24","DOI":"10.1109\/79.985679"},{"doi-asserted-by":"crossref","unstructured":"P. Schaumont, I. Verbauwhede, \u201cA Reconfiguration Hierarchy for Elliptic Curve Cryptography,\u201d Proc. 35th Asilomar Conference on Signals, Systems and Computers, Asilomar, Nov. 2001.","key":"10_CR25","DOI":"10.1109\/ACSSC.2001.986966"},{"doi-asserted-by":"crossref","unstructured":"P. Schaumont, I. Verbauwhede, \u201cDomain-specific codesign for embedded security,\u201d IEEE Computer, pg. 68\u201374, April 2003.","key":"10_CR26","DOI":"10.1109\/MC.2003.1193231"},{"doi-asserted-by":"crossref","unstructured":"C. Schuba, I. Krsul, M. Kuhn, G. Spafford, A. Sundaram, and D. Zamboni, \u201cAnalysis of a denial of service attack on TCP,\u201d In Proc. of the 1997 IEEE Symposium on Security and Privacy, pg. 208\u2013223, IEEE Computer Society Press, May 1997.","key":"10_CR27","DOI":"10.1109\/SECPRI.1997.601338"},{"doi-asserted-by":"crossref","unstructured":"F. Stajano, R. Anderson, \u201cThe Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Net-works,\u201d B. Christianson, B. Crispo and M. Roe (Eds.) Security protocols, 7th International Workshop proceedings, LNCS, 1999.","key":"10_CR28","DOI":"10.1007\/10720107_24"},{"doi-asserted-by":"crossref","unstructured":"F. Stajano, \u201cThe Resurrecting Duckling \u2014 what next?,\u201d B. Christianson, B. Crispo and M. Roe (Eds.) Security protocols, 8th International Workshop proceedings, LNCS, 2000.","key":"10_CR29","DOI":"10.1007\/3-540-44810-1_28"},{"unstructured":"D. R. Stinson, \u201cCryptography Theory and Practice,\u201d First Edition, CRC Press, 1995.","key":"10_CR30"},{"doi-asserted-by":"crossref","unstructured":"K. Tiri, I. Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. Proc. Of Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2779, pg. 125\u2013136, Sept. 2003.","key":"10_CR31","DOI":"10.1007\/978-3-540-45238-6_11"},{"doi-asserted-by":"crossref","unstructured":"K. Tiri, I. Verbauwhede, \u201cA Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation,\u201d Proc. DATE 2004, Paris, Feb. 2004.","key":"10_CR32","DOI":"10.1109\/DATE.2004.1268856"},{"doi-asserted-by":"crossref","unstructured":"I. Verbauwhede, M.F.-C. Chang, \u201cReconfigurable Interconnect for next generation systems,\u201d Proc. ACM\/Sigda International workshop System Level Interconnect Prediction (SLIP02), ACM Press, pp. 71\u201374, 2002.","key":"10_CR33","DOI":"10.1145\/505348.505363"},{"unstructured":"I. Verbauwhede, P. Schaumont, Christian Piguet, Bart Kienhuis, \u201cArchitectures and design techniques for energy efficient embedded DSP and multimedia processing,\u201d Proceedings DATE, Feb. 2004.","key":"10_CR34"},{"unstructured":"WINS \u2014 Wireless Integrated Network Sensor http:\/\/wins.rockwellscientific.com","key":"10_CR35"},{"doi-asserted-by":"crossref","unstructured":"A. Wood, J. Stankovic, \u201cDenial of Service in Sensor Networks,\u201d IEEE Computer Magazine, Oct. 2002, pg. 54\u201362.","key":"10_CR36","DOI":"10.1109\/MC.2002.1039518"}],"container-title":["Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-27139-2_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T21:05:43Z","timestamp":1683320743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-27139-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540238670"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/3-540-27139-2_10","relation":{},"subject":[]}}