{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T22:10:03Z","timestamp":1749679803048,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319489643"},{"type":"electronic","value":"9783319489650"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48965-0_34","type":"book-chapter","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T13:55:25Z","timestamp":1477576525000},"page":"552-561","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping \u2013 Secrecy Amplification Case"],"prefix":"10.1007","author":[{"given":"Radim","family":"O\u0161\u0165\u00e1dal","sequence":"first","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: 12th IEEE International Conference on Network Protocols, pp. 206\u2013215. IEEE (2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"34_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.entcs.2005.09.043","volume":"157","author":"D Cvr\u010dek","year":"2006","unstructured":"Cvr\u010dek, D., \u0160venda, P.: Smart dust security-key infection revisited. Electron. Notes Theoret. Comput. Sci. 157, 11\u201325 (2006). Elsevier","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 62\u201371 (2003)","DOI":"10.1145\/986858.986868"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V. D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 41\u201347. ACM (2002)","DOI":"10.1145\/586110.586117"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-11851-2_16","volume-title":"Security and Trust Management","author":"F Jurne\u010dka","year":"2014","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: Evaluation of key management schemes in wireless sensor networks. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 198\u2013203. Springer, Heidelberg (2014). doi:10.1007\/978-3-319-11851-2_16"},{"key":"34_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-319-12400-1_29","volume-title":"Security Protocols XXII","author":"F Jurne\u010dka","year":"2014","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: On node capturing attacker strategies. In: Christianson, B., Malcolm, J., Maty\u00e1\u0161, V., \u0160venda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 300\u2013315. Springer, Heidelberg (2014)"},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/11561354_11","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"Y-H Kim","year":"2005","unstructured":"Kim, Y.-H., Kim, M.H., Lee, D.-H., Kim, C.: A key management scheme for commodity sensor networks. In: Syrotiuk, V.R., Ch\u00e1vez, E. (eds.) ADHOC-NOW 2005. LNCS, vol. 3738, pp. 113\u2013126. Springer, Heidelberg (2005)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"K\u00f6pke, A., et al.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, p. 71. ICST (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security, pp. 52\u201361. ACM Press (2003)","DOI":"10.1145\/948109.948119"},{"issue":"1","key":"34_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41\u201377 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"12","key":"34_CR12","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-319-12060-7_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"R O\u0161\u0165\u00e1dal","year":"2014","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: A new approach to secrecy amplification in partially compromised networks (invited paper). In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 92\u2013109. Springer, Heidelberg (2014)"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: Attackers in Wireless Sensor Networks Will Be Neither Random nor Jumping - Secrecy Amplification Case, Extended Version, Technical report FIMU-RS-2016-04. Masaryk University, Czech Republic (2016)","DOI":"10.1007\/978-3-319-48965-0_34"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733\u2013738. IEEE (2011)","DOI":"10.1109\/MASS.2011.80"},{"issue":"4","key":"34_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/13.804561","volume":"42","author":"A Varga","year":"1999","unstructured":"Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42(4), 11 (1999)","journal-title":"IEEE Trans. Educ."},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"\u0160venda, P., Sekanina, L. , Maty\u00e1\u0161, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: Second ACM Conference on Wireless Network Security, pp. 225\u2013236 (2009)","DOI":"10.1145\/1514274.1514306"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48965-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T21:55:32Z","timestamp":1749678932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-48965-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319489643","9783319489650"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48965-0_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cans2016.di.unimi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}