{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:27:44Z","timestamp":1725514064862},"publisher-location":"Boston, MA","reference-count":7,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387094403"},{"type":"electronic","value":"9780387094410"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09441-0_10","type":"book-chapter","created":{"date-parts":[[2008,5,24]],"date-time":"2008-05-24T04:47:07Z","timestamp":1211604427000},"page":"113-124","source":"Crossref","is-referenced-by-count":1,"title":["A Security Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Chang N.","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qian","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Cungang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"J. P. Kaps, G. Gaubatz, and B. Sunar. Cryptography on a Speck of Dust. IEEE Computer Magazine, Feb. 2007, pp38-44.","DOI":"10.1109\/MC.2007.52"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks, 2002, pp521-534.","DOI":"10.1023\/A:1016598314198"},{"key":"10_CR3","unstructured":"I. Mantin. Analysis of the Stream Cipher RC4. Master\u2019s thesis, The Weizmann Institute of Science, 2001."},{"key":"10_CR4","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2003","unstructured":"W. Stallings. Cryptography and Network Security, Principles and Practice. Prentice Hall, 2003."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"S. Mitchell and K. Srinivasan. State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks. In proceedings of the 1st ACM international workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, 2004, pp112-118.","DOI":"10.1145\/1023756.1023777"},{"key":"10_CR6","unstructured":"A. Stubblefield, J. loannidis, and A.D. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. AT&T Labs Technical Report, Aug. 2001"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"S. Fluhrer, I. Mantin, and A. Shamir. Weakness in the Key Scheduling Algorithm of RC4. Proceedings, Workshop in Selected Areas of Cryptography, 2001.","DOI":"10.1007\/3-540-45537-X_1"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Wireless Sensor and Actor Networks II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09441-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:37:06Z","timestamp":1619559426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09441-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094403","9780387094410"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09441-0_10","relation":{},"subject":[]}}