{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:03:29Z","timestamp":1725905009961},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319638584"},{"type":"electronic","value":"9783319638591"}],"license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-63859-1_36","type":"book-chapter","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T07:54:54Z","timestamp":1500278094000},"page":"290-297","source":"Crossref","is-referenced-by-count":0,"title":["Accelerated vBNN\u2013IBS Authentication Scheme for WSN"],"prefix":"10.1007","author":[{"given":"Danyang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingya","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Songxiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Erfu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"issue":"2","key":"36_CR1","first-page":"52","volume":"1","author":"V Snasel","year":"2016","unstructured":"Snasel, V., Kong, L.: Sink node placement strategies based on cat swarm optimization algorithm. J. Netw. Intell. 1(2), 52\u201360 (2016)","journal-title":"J. Netw. Intell."},{"issue":"2","key":"36_CR2","first-page":"500","volume":"8","author":"J-P Li","year":"2017","unstructured":"Li, J.-P., Dong, Z.-Q.: Uneven clustering and data transmission strategy for energy hole problem in wireless sensor networks. J. Inf. Hiding Multimedia Signal Process. 8(2), 500\u2013509 (2017)","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"36_CR3","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrg","year":"2002","unstructured":"Perrg, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. ACM Wireless Netw. 8, 521\u2013534 (2002)","journal-title":"ACM Wireless Netw."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Mansouri, D., Mokdad, L., Ben-othman, J., Ioualalen, M.: Detecting DoS attacks in WSN based on clustering technique. In: 2013 IEEE Wireless Communication and Networking Conference (WCNC), pp. 2214\u20132219 (2013)","DOI":"10.1109\/WCNC.2013.6554905"},{"key":"36_CR5","doi-asserted-by":"crossref","first-page":"2217","DOI":"10.1109\/JSEN.2016.2519539","volume":"16","author":"D Kim","year":"2016","unstructured":"Kim, D., An, S.: PKC-based DoS attacks-resistant scheme in wireless sensor networks. IEEE Sens. J. 16, 2217\u20132218 (2016)","journal-title":"IEEE Sens. J."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Kodali, R.K: Implementation of ECDSA in WSN. In: 2013 International Conference on Control Communication and Computing (ICCC), pp. 310\u2013314 (2013)","DOI":"10.1109\/ICCC.2013.6731670"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Saqib, N., Iqbal, U.: Security in wireless sensor networks using ECC. In: 2016 IEEE International Conference on Advances in Computer Applications (ICACA), pp. 270\u2013274 (2016)","DOI":"10.1109\/ICACA.2016.7887964"},{"key":"36_CR8","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.procs.2015.06.009","volume":"54","author":"LD Singh","year":"2015","unstructured":"Singh, L.D., Singh, K.M.: Implementation of text encryption using elliptic curve cryptography. Procedia Comput. Sci. 54, 73\u201382 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Yusof, Y.M., Muzahidul Islam, A.K.M., Baharum, S.: An experimental study of WSN transmission power optimization using MICAz motes. In: 2015 International Conference on Advances in Electrical Engineering (ICAEE), pp. 182\u2013185 (2015)","DOI":"10.1109\/ICAEE.2015.7506826"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Lu, X., Cen, J., Zhang, X.: Node state optimization based coverage control algorithm for wireless sensor networks. In: 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, pp. 163\u2013166 (2014)","DOI":"10.1109\/ITAIC.2014.7065027"}],"container-title":["Smart Innovation, Systems and Technologies","Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63859-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T08:03:17Z","timestamp":1500278597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63859-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"ISBN":["9783319638584","9783319638591"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63859-1_36","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2017,7,18]]}}}