{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:15:15Z","timestamp":1726002915165},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319989341"},{"type":"electronic","value":"9783319989358"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98935-8_12","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T16:19:26Z","timestamp":1544113166000},"page":"255-267","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Public Key-Based Lightweight Swarm Authentication"],"prefix":"10.1007","author":[{"given":"Simon","family":"Cogliani","sequence":"first","affiliation":[]},{"given":"Bao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Houda","family":"Ferradi","sequence":"additional","affiliation":[]},{"given":"R\u00e9mi","family":"G\u00e9raud","sequence":"additional","affiliation":[]},{"given":"Diana","family":"Maimu\u0163","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Portella do Canto","sequence":"additional","affiliation":[]},{"given":"Guilin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","first-page":"319","volume-title":"A ZKP-based identification scheme for base nodes in wireless sensor networks, in Proceedings of the 2005 ACM Symposium on Applied Computing, SAC \u201905","author":"D Anshul","year":"2005","unstructured":"D. Anshul, S. Roy, A ZKP-based identification scheme for base nodes in wireless sensor networks, in Proceedings of the 2005 ACM Symposium on Applied Computing, SAC \u201905 (ACM, New York, 2005), pp. 319\u2013323"},{"key":"12_CR2","first-page":"416","volume-title":"Lecture Notes in Computer Science","author":"Dan Boneh","year":"2003","unstructured":"D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in Advances in Cryptology \u2013 EUROCRYPT 2003, ed. by E. Biham. Lecture Notes in Computer Science, vol. 2656 (Springer, Heidelberg, 2003), pp. 416\u2013432"},{"key":"12_CR3","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2001","unstructured":"T.H. Cormen, C. Stein, R.L. Rivest, C.E. Leiserson, Introduction to Algorithms, 2nd edn. (McGraw-Hill Higher Education, New York, 2001)","edition":"2"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U Feige","year":"1988","unstructured":"U. Feige, A. Fiat, A. Shamir, Zero-knowledge proofs of identity. J. Cryptol. 1(2), 77\u201394 (1988)","journal-title":"J. Cryptol."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in Advances in Cryptology \u2013 CRYPTO\u201986, ed. by A.M. Odlyzko. Lecture Notes in Computer Science, vol. 263 (Springer, Heidelberg, 1987), pp. 186\u2013194","DOI":"10.1007\/3-540-47721-7_12"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"M. Girault, J. Stern, On the length of cryptographic hash-values used in identification schemes, in Advances in Cryptology \u2013 CRYPTO\u201994. ed. by Y. Desmedt. Lecture Notes in Computer Science, vol. 839 (Springer, Heidelberg, 1994), pp. 202\u2013215","DOI":"10.1007\/3-540-48658-5_21"},{"key":"12_CR7","first-page":"291","volume-title":"Proceedings of the 17th Annual ACM Symposium on Theory of Computing, May 6\u20138, 1985, Providence, Rhode Island, USA","author":"S Goldwasser","year":"1985","unstructured":"S. Goldwasser, S. Micali, C. Rackoff, The knowledge complexity of interactive proof-systems (extended abstract), in Proceedings of the 17th Annual ACM Symposium on Theory of Computing, May 6\u20138, 1985, Providence, Rhode Island, USA, ed. by R. Sedgewick (ACM, New York, 1985), pp. 291\u2013304. http:\/\/doi.acm.org\/10.1145\/22145.22178"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"L.C. Guillou, J.J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory, in Advances in Cryptology \u2013 EUROCRYPT\u201988, ed. by C.G. G\u00fcnther. Lecture Notes in Computer Science, vol. 330 (Springer, Heidelberg, 1988), pp. 123\u2013128","DOI":"10.1007\/3-540-45961-8_11"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.jpdc.2007.07.005","volume":"68","author":"C Lavault","year":"2008","unstructured":"C. Lavault, M. Valencia-Pabon, A distributed approximation algorithm for the minimum degree minimum weight spanning trees. J. Parallel Distrib. Comput. 68(2), 200\u2013208 (2008)","journal-title":"J. Parallel Distrib. Comput."},{"key":"12_CR10","volume-title":"A distributed spanning tree algorithm for topology-aware networks","author":"AJ Mooij","year":"2003","unstructured":"A.J. Mooij, N. Goga, J.W. Wesselink, A distributed spanning tree algorithm for topology-aware networks. Technische Universiteit Eindhoven, Department of Mathematics and Computer Science (2003)"},{"issue":"5","key":"12_CR11","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, Spins: security protocols for sensor networks. Wirel. Netw. 8(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"12_CR12","first-page":"661","volume-title":"Approximating minimum bounded degree spanning trees to within one of optimal, in Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing","author":"M Singh","year":"2007","unstructured":"M. Singh, L.C. Lau, Approximating minimum bounded degree spanning trees to within one of optimal, in Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing (ACM, New York, 2007), pp. 661\u2013670"},{"key":"12_CR13","first-page":"1","volume-title":"Wireless sensor network security model using zero knowledge protocol, in 2011 IEEE International Conference on Communications","author":"SK Udgata","year":"2011","unstructured":"S.K. Udgata, A. Mubeen, S.L. Sabat, Wireless sensor network security model using zero knowledge protocol, in 2011 IEEE International Conference on Communications (IEEE, Piscataway, 2011), pp. 1\u20135"},{"key":"12_CR14","first-page":"416","volume-title":"Communications in Computer and Information Science","author":"Muneera Hashim","year":"2011","unstructured":"M. Hashim, G. Santhosh Kumar, A. Sreekumar, Authentication in wireless sensor networks using zero knowledge protocol, in Computer Networks and Intelligent Computing. vol. 157 (Springer, Berlin, 2011), pp. 416\u2013421"},{"issue":"14","key":"12_CR15","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.1016\/j.comnet.2010.04.008","volume":"54","author":"L Zhang","year":"2010","unstructured":"L. Zhang, B. Qin, Q. Wu, F. Zhang, Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Netw. 54(14), 2482\u20132491 (2010)","journal-title":"Comput. Netw."}],"container-title":["Cyber-Physical Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98935-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:00:35Z","timestamp":1573063235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98935-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319989341","9783319989358"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98935-8_12","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}