{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T20:40:03Z","timestamp":1748637603361,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319250663"},{"type":"electronic","value":"9783319250670"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25067-0_18","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T11:26:19Z","timestamp":1443093979000},"page":"225-236","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Noura","sequence":"first","affiliation":[]},{"given":"Damien","family":"Courouss\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"18_CR1","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/978-3-642-40640-9_90","volume-title":"Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, volume 4","author":"Y. Huang","year":"2014","unstructured":"Huang, Y.: Research of efficient security scheme in wireless network. In: Liu, X., Ye, Y. (eds.) Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, volume 4. LNEE, vol.\u00a0273, pp. 717\u2013724. Springer, Heidelberg (2014)"},{"key":"18_CR2","unstructured":"Karygiannis, T., Owens, L.: Wireless network security. In: NIST Special Publication, vol.\u00a0800, p. 48 (2002)"},{"key":"18_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Dworkin, M., Dworkin, M., Gallagher, P.D., Director Nist Special Publication -f : Recommendation for block cipher modes of operation: Methods and techniques (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"18_CR5","unstructured":"Lee, H., Lee, K., Shin, Y.: Aes implementation and performance evaluation on 8-bit microcontrollers. CoRR, abs\/0911.0482 (2009)"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/ir:20030303","volume":"49","author":"C. Evans-Pughe","year":"2003","unstructured":"Evans-Pughe, C.: Bzzzz zzz [ZigBee wireless standard]. IEE Review\u00a049(3), 28\u201331 (2003)","journal-title":"IEE Review"},{"key":"18_CR7","first-page":"242","volume-title":"Proceedings of the 14th IEEE International Conference on Emerging Technologies & Factory Automation, ETFA 2009","author":"S. Raza","year":"2009","unstructured":"Raza, S., Slabbert, A., Voigt, T., Landern\u00e4s, K.: Security considerations for the wireless hart protocol. In: Proceedings of the 14th IEEE International Conference on Emerging Technologies & Factory Automation, ETFA 2009, pp. 242\u2013249. IEEE Press, Piscataway (2009)"},{"issue":"5","key":"18_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw.\u00a08(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"18_CR9","first-page":"162","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004","author":"C. Karlof","year":"2004","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162\u2013175. ACM, New York (2004)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: ACM, pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"18_CR11","unstructured":"Skipjack, N.: KEA algorithm specifications (1998)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1995","unstructured":"Rivest, R.L.: The rc5 encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 86\u201396. Springer, Heidelberg (1995)"},{"key":"18_CR13","unstructured":"Li, T., Wu, H., Wang, X., Bao, F.: SenSec design. Institue for InfoComm Research, Tech. Rep. TR-I2R-v1, vol. 1 (2005)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC)\u00a08(2), 228\u2013258 (2005)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Noura, H., Martin, S., Agha, K.A.: E3sn - efficient security scheme for sensor networks. In: SECRYPT, pp. 615\u2013621 (2013)","DOI":"10.5220\/0004613006150621"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Noura, H., Martin, S., AI Agha, K., Grote, W.: Key dependent cipher scheme for sensor networks. In: 2013 12th Annual Mediterranean Hoc Networking Workshop (MED-HOC-NET), pp. 148\u2013154, June 2013","DOI":"10.1109\/MedHocNet.2013.6767424"},{"issue":"6","key":"18_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/40.977759","volume":"21","author":"R.B. Lee","year":"2001","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Cryptography efficient permutation instructions for fast software. IEEE Micro\u00a021(6), 56\u201369 (2001)","journal-title":"IEEE Micro"},{"key":"18_CR18","unstructured":"Campagna, M.J.: Security bounds for the nist codebook-based deterministic random bit generator (2006), matthew.campagna@pb.com 13453 received November 1, 2006. http:\/\/eprint.iacr.org\/2006\/379"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Thirteen Ways to Look at the Correlation Coefficient. The American Statistician\u00a042(1), 59\u201366 (1988)","DOI":"10.1080\/00031305.1988.10475524"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25067-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:58:31Z","timestamp":1748635111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25067-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319250663","9783319250670"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25067-0_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}