{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T15:10:01Z","timestamp":1750777801377,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319620329"},{"type":"electronic","value":"9783319620336"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62033-6_25","type":"book-chapter","created":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T08:22:06Z","timestamp":1500366126000},"page":"219-227","source":"Crossref","is-referenced-by-count":0,"title":["Reconsidering Attacker Models in Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Radim","family":"O\u0161\u0165\u00e1dal","sequence":"first","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of Fifth IEEE\/ACM International Workshop on Grid Computing, pp. 4\u201310. IEEE (2004)","DOI":"10.1109\/GRID.2004.14"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: 12th IEEE International Conference on Network Protocols, pp. 206\u2013215. IEEE (2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 41\u201347. ACM (2002)","DOI":"10.1145\/586110.586117"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-11851-2_16","volume-title":"Security and Trust Management","author":"F Jurne\u010dka","year":"2014","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: Evaluation of key management schemes in wireless sensor networks. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 198\u2013203. Springer, Cham (2014). doi: 10.1007\/978-3-319-11851-2_16"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-12400-1_29","volume-title":"Security Protocols XXII","author":"F Jurne\u010dka","year":"2014","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: On node capturing attacker strategies. In: Christianson, B., Malcolm, J., Maty\u00e1\u0161, V., \u0160venda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 300\u2013315. Springer, Cham (2014). doi: 10.1007\/978-3-319-12400-1_29"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"K\u00f6pke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, p. 71. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"issue":"12","key":"25_CR7","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-319-12060-7_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"R O\u0161\u0165\u00e1dal","year":"2014","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: A new approach to secrecy amplification in partially compromised networks (invited paper). In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 92\u2013109. Springer, Cham (2014). doi: 10.1007\/978-3-319-12060-7_7"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-24018-3_1","volume-title":"Information Security Theory and Practice","author":"R O\u0161\u0165\u00e1dal","year":"2015","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., Maty\u00e1\u0161, V.: On secrecy amplification protocols. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 3\u201319. Springer, Cham (2015). doi: 10.1007\/978-3-319-24018-3_1"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-29139-5_17","volume-title":"Genetic Programming","author":"T Smolka","year":"2012","unstructured":"Smolka, T., \u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of message efficient secrecy amplification protocols. In: Moraglio, A., Silva, S., Krawiec, K., Machado, P., Cotta, C. (eds.) EuroGP 2012. LNCS, vol. 7244, pp. 194\u2013205. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-29139-5_17"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Stehlik, M., Saleh, A., Stetsko, A., Matyas, V.: Multi-objective optimization of intrusion detection systems for wireless sensor networks. In: Advances in Artificial Life, ECAL, vol. 12, pp. 569\u2013576 (2013)","DOI":"10.7551\/978-0-262-31709-2-ch082"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733\u2013738. IEEE (2011)","DOI":"10.1109\/MASS.2011.80"},{"issue":"4","key":"25_CR13","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/13.804561","volume":"42","author":"A Varga","year":"1999","unstructured":"Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42(4), 11 (1999)","journal-title":"IEEE Trans. Educ."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"\u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: Second ACM Conference on Wireless Network Security, pp. 225\u2013236 (2009)","DOI":"10.1145\/1514274.1514306"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62033-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T14:28:08Z","timestamp":1750775288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62033-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319620329","9783319620336"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62033-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}