{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:38:13Z","timestamp":1742927893154,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_39","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"500-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Key Certification Using Accumulators for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jun-Young","family":"Bae","sequence":"first","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Franck","family":"Rousseau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"39_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"N Bari\u0107","year":"1997","unstructured":"Bari\u0107, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480\u2013494. Springer, Heidelberg (1997)"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"JC Benaloh","year":"1994","unstructured":"Benaloh, J.C., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274\u2013285. Springer, Heidelberg (1994)"},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"39_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and Cooperation in Wireless Networks","author":"L Buttyan","year":"2007","unstructured":"Buttyan, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)"},{"key":"39_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-14712-8_11","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2010","author":"P Camacho","year":"2010","unstructured":"Camacho, P., Hevia, A.: On the impossibility of batch update for cryptographic accumulators. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 178\u2013188. Springer, Heidelberg (2010)"},{"key":"39_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-45708-9_5","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"JL Camenisch","year":"2002","unstructured":"Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002)"},{"key":"39_CR7","unstructured":"Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM, March 2005, pp. 524\u2013535. IEEE (2005)"},{"key":"39_CR8","first-page":"277","volume-title":"Wireless Sensor Networks","author":"H Chan","year":"2004","unstructured":"Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.) Wireless Sensor Networks, pp. 277\u2013303. Springer, New York (2004)"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security - CCS 2002, November 2002, pp. 41\u201347. ACM (2002)","DOI":"10.1145\/586110.586117"},{"key":"39_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-04159-4_25","volume-title":"Selected Areas in Cryptography","author":"J Fan","year":"2009","unstructured":"Fan, J., Batina, L., Verbauwhede, I.: HECC goes embedded: an area-efficient implementation of HECC. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 387\u2013400. Springer, Heidelberg (2009)"},{"key":"39_CR11","unstructured":"Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003\/216. http:\/\/eprint.iacr.org\/2003\/216\/ (2003)"},{"key":"39_CR12","unstructured":"Gollakota, S., Ahmed, N., Zeldovich, N., Katabi, D.: Secure In-Band wireless pairing. In: USENIX Security Symposium, August 2011"},{"key":"39_CR13","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"issue":"2","key":"39_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1002\/rsa.20208","volume":"33","author":"A Kirsch","year":"2008","unstructured":"Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better Bloom filter. Random Struct. Algorithms 33(2), 187\u2013218 (2008)","journal-title":"Random Struct. Algorithms"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks - IPSN 2008, April 2008","DOI":"10.1109\/IPSN.2008.47"},{"key":"39_CR16","unstructured":"NIST National Institute of Standards and Technology. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST Special Publication 800-56A, March 2007"},{"key":"39_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-60865-6_45","volume-title":"Fast Software Encryption","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83\u201387. Springer, Heidelberg (1996)"},{"key":"39_CR18","unstructured":"Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy - S&P 2005, May 2005"},{"key":"39_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Singel\u00e9e, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: International Conference on Mobile and Ubiquitous Systems - MobiQuitous 2007, August 2007","DOI":"10.1109\/MOBIQ.2007.4451066"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Sun, K., Liu, A., Xu, R., Ning, P., Maughan, W.D.: Securing network access in wireless sensor networks. In: ACM Conference on Wireless Network Security - WISEC 2009, March 2009","DOI":"10.1145\/1514274.1514310"},{"key":"39_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"39_CR23","unstructured":"Verbauwhede, I.: Low budget cryptography to enable wireless security. In: ACM Conference on Wireless Network Security, Invited talk, June 2011"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Watro, R.J., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN 2004, October 2004","DOI":"10.1145\/1029102.1029113"},{"issue":"5","key":"39_CR25","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1093\/ietisy\/e91-d.5.1489","volume":"E91.D","author":"DH Yum","year":"2008","unstructured":"Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Trans. Inf. Syst. E91.D(5), 1489\u20131491 (2008)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"39_CR26","unstructured":"Zachary, J.: A decentralized approach to secure management of nodes in distributed sensor networks. In: IEEE Military Communications Conference - MILCOM \u201903, October 2003"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:54:14Z","timestamp":1676894054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_39","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}