{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:03:50Z","timestamp":1748664230424,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319240176"},{"type":"electronic","value":"9783319240183"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24018-3_1","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T11:32:50Z","timestamp":1440156770000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On Secrecy Amplification Protocols"],"prefix":"10.1007","author":[{"given":"Radim","family":"O\u0161\u0165\u00e1dal","sequence":"first","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,24]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: 12th IEEE International Conference on Network Protocols, pp. 206\u2013215. IEEE (2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"1_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"1_CR3","unstructured":"Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks, Wireless Sensor Networks, ISBN 1-4020-7883-8. Kluwer Academic Publishers (2004)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.entcs.2005.09.043","volume":"157","author":"D Cvr\u010dek","year":"2006","unstructured":"Cvr\u010dek, D., \u0160venda, P.: Smart dust security-key infection revisited. Electronic Notes in Theoretical Computer Science 157, 11\u201325 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 62\u201371 (2003)","DOI":"10.1145\/986858.986868"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM, Washington, DC (2002)","DOI":"10.1145\/586115.586117"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/11561354_11","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"Y-H Kim","year":"2005","unstructured":"Kim, Y.-H., Kim, M.H., Lee, D.-H., Kim, C.: A key management scheme for commodity sensor networks. In: Syrotiuk, V.R., Ch\u00e1vez, E. (eds.) ADHOC-NOW 2005. LNCS, vol. 3738, pp. 113\u2013126. Springer, Heidelberg (2005)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security, pp. 52\u201361. ACM Press (2003)","DOI":"10.1145\/948109.948119"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41\u201377 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Z., Ma, J., Huang, Q., Moon, S.J.: Storage requirements for key distribution in sensor networks. In: Second International Conference on Sensor Technologies and Applications, pp. 631\u2013638 (2008)","DOI":"10.1109\/SENSORCOMM.2008.16"},{"issue":"8","key":"1_CR11","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1109\/TWC.2010.061410.100084","volume":"9","author":"Z Liu","year":"2010","unstructured":"Liu, Z., Ma, J., Pei, Q., Pang, L., Park, Y.H.: Key infection, secrecy transfer, and key evolution for sensor networks. IEEE Transactions on Wireless Communications 9(8), 2643\u20132653 (2010)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-319-12060-7_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"R O\u0161\u0165\u00e1dal","year":"2014","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: A new approach to secrecy amplification in partially compromised networks (Invited Paper). In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 92\u2013109. Springer, Heidelberg (2014)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: On Secrecy Amplification Protocols - Extended version, Technical report FIMU-RS-2015-01. Masaryk university, Brno (2015)","DOI":"10.1007\/978-3-319-24018-3_1"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-29139-5_17","volume-title":"Genetic Programming","author":"T Smolka","year":"2012","unstructured":"Smolka, T., \u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of message efficient secrecy amplification protocols. In: Moraglio, A., Silva, S., Krawiec, K., Machado, P., Cotta, C. (eds.) EuroGP 2012. LNCS, vol. 7244, pp. 194\u2013205. Springer, Heidelberg (2012)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"\u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: Second ACM Conference on Wireless Network Security, pp. 225\u2013236 (2009)","DOI":"10.1145\/1514274.1514306"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24018-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T03:27:41Z","timestamp":1748575661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24018-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319240176","9783319240183"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24018-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}