{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:23Z","timestamp":1725558983348},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_11","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T17:15:56Z","timestamp":1278868556000},"page":"86-100","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks"],"prefix":"10.1007","author":[{"given":"Stefaan","family":"Seys","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/98.626977","volume":"4","author":"F. Bennett","year":"1997","unstructured":"Bennett, F., Clarke, D., Evans, J., Hopper, A., Jones, A., Leask, D.: Piconet: embedded mobile networking. IEEE Personal Communications\u00a04, 8\u201315 (1997)","journal-title":"IEEE Personal Communications"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/3-540-48658-5_9","volume-title":"Advances in Cryptology - CRYPTO 1994","author":"D. Bleichenbacher","year":"1994","unstructured":"Bleichenbacher, D., Maurer, U.M.: Directed acyclic graphs, one-way functions and digital signatures. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 75\u201382. Springer, Heidelberg (1994)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"S. Even","year":"1990","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 263\u2013275. Springer, Heidelberg (1990)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/3-540-36563-X_21","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M. Jakobsson","year":"2003","unstructured":"Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal merkle tree representation and traversal. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 314\u2013326. Springer, Heidelberg (2003)"},{"key":"11_CR5","first-page":"483","volume-title":"Proceedings of the 5th International Conference on Mobile Computing and Networking (MobiCom 1999)","author":"J. Kahn","year":"1999","unstructured":"Kahn, J., Katz, R., Pister, K.: Next century challenges: Mobile networking for \u201csmart dust\u201d. In: Proceedings of the 5th International Conference on Mobile Computing and Networking (MobiCom 1999), pp. 483\u2013492. ACM Press, New York (1999)"},{"key":"11_CR6","unstructured":"Lamport, L.: Constructing digital signatures from a one way function. Technical Report CSL-98, SRI International (October 1979)"},{"key":"11_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2013 CRYPTO 1989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.)Advances in Cryptology \u2013 CRYPTO 1989. LNCS, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"11_CR9","volume-title":"Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)","author":"A. Perrig","year":"2001","unstructured":"Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001).ACM Press, New York (2001)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Rabaey, J., Ammer, J., da Silva, J., Patel, D., Roundy, S.: Picoradio supports ad hoc ultra-low power wireless networking. IEEE Computer Magazine (July 2000)","DOI":"10.1109\/2.869369"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45450-0_11","volume-title":"Information Security and Privacy","author":"L. Reyzin","year":"2002","unstructured":"Reyzin, L., Reyzin, N.: Better than biBa: Short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 144\u2013153. Springer, Heidelberg (2002)"},{"key":"11_CR12","unstructured":"Szewczyk, R., Ferencz, A.: Power evaluation of smartdust remote sensors. CS252 project reports (final), Berkeley Wireless Research Center (2000)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Szydlo","year":"2004","unstructured":"Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.)Advances in Cryptology \u2013 EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 541\u2013554. Springer, Heidelberg (2004)"},{"key":"11_CR14","unstructured":"University of California, Wireless integrated network sensors (WINS), http:\/\/www.janet.ucla.edu\/WINS\/"},{"key":"11_CR15","series-title":"CISM Courses and lectures","first-page":"217","volume-title":"Proceedings of EUROCODE\u00a01992","author":"S. Vaudenay","year":"1992","unstructured":"Vaudenay, S.: One-time identification with low memory. In: Camion, P., Chappin, P., Harari, S. (eds.) Proceedings of EUROCODE\u00a01992. CISM Courses and lectures, vol.\u00a0339, pp. 217\u2013228. Springer, Heidelberg (1992)"},{"issue":"1","key":"11_CR16","first-page":"3","volume":"4","author":"M.J. Wiener","year":"1998","unstructured":"Wiener, M.J.: Performance comparison of public-key cryptosystems. RSA Laboratories\u2019 CryptoBytes\u00a04(1), 1+3\u20135 (1998)","journal-title":"RSA Laboratories\u2019 CryptoBytes"},{"key":"11_CR17","volume-title":"Digital Modulation and Coding","author":"S.G. Wilson","year":"1996","unstructured":"Wilson, S.G.: Digital Modulation and Coding. Prentice Hall, Englewood Cliffs (1996)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine Special Issue on Network Security\u00a013(6) (1999)","DOI":"10.1109\/65.806983"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:33:51Z","timestamp":1605742431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}