{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:36:13Z","timestamp":1725514573958},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691693"},{"type":"electronic","value":"9783540691709"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69170-9_7","type":"book-chapter","created":{"date-parts":[[2008,6,6]],"date-time":"2008-06-06T10:31:15Z","timestamp":1212748275000},"page":"99-111","source":"Crossref","is-referenced-by-count":11,"title":["Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters"],"prefix":"10.1007","author":[{"given":"Yu-Shian","family":"Chen","sequence":"first","affiliation":[]},{"given":"I-Lun","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chin-Laung","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Yen-Hua","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1145\/381677.381696","volume-title":"7th ACM Annual International Conference on Mobile Computing and Networking","author":"A. Perrig","year":"2001","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: 7th ACM Annual International Conference on Mobile Computing and Networking, pp. 189\u2013199. ACM Press, New York (2001)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D. Liu","year":"2004","unstructured":"Liu, D., Ning, P.: Multilevel \u03bcTESLA: Broadcast Authentication for Distributed Sensor Networks. Trans. on Embedded Computing Sys.\u00a03, 800 (2004)","journal-title":"Trans. on Embedded Computing Sys."},{"key":"7_CR3","first-page":"118","volume-title":"2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005)","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), pp. 118\u2013132. IEEE Computer Society, Los Alamitos (2005)"},{"key":"7_CR4","unstructured":"Menezes, A.J., Oorschot, P.C.v., Vanstone, S.A.: Handbook of Applied Cryptography, \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/hac\/"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ASAP.2005.15","volume-title":"16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005)","author":"H. Eberle","year":"2005","unstructured":"Eberle, H., Wander, A., Gura, N., Shantz, S.C., Gupta, V.: Architectural Extensions for Elliptic Curve Cryptography over GF(2\n                    m\n                  ) on 8-bit Microprocessors. In: 16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005), pp. 343\u2013349. IEEE Computer Society, Los Alamitos (2005)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/PERCOM.2005.41","volume-title":"Third IEEE International Conference on Pervasive Computing and Communications","author":"V. Gupta","year":"2005","unstructured":"Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-Based End-to-end Security Architecture for the Embedded Internet. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 247\u2013256. IEEE Computer Society, Los Alamitos (2005)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/1180345.1180364","volume-title":"SASN 2006","author":"M. Luk","year":"2006","unstructured":"Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: Zhu, S., Liu, D. (eds.) SASN 2006, pp. 147\u2013156. ACM Press, New York (2006)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M. Mitzenmacher","year":"2002","unstructured":"Mitzenmacher, M.: Compressed Bloom Filters. IEEE\/ACM Trans. Netw.\u00a010, 604 (2002)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L. Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE\/ACM Trans. Netw.\u00a08, 281 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"7_CR11","unstructured":"Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA Broadcast Authentication Protocol. In: Cryptobytes, vol.\u00a05(2), pp. 2\u201313. RSA Laboratories (2002)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1145\/1128817.1128864","volume-title":"ASIACCS 2006","author":"S.-M. Chang","year":"2006","unstructured":"Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M.: An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. In: Lin, F.-C., Lee, D.-T., Lin, B.-S., Shieh, S., Jajodia, S. (eds.) ASIACCS 2006, pp. 311\u2013320. ACM, New York (2006)"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1145\/1236360.1236421","volume-title":"IPSN 2007","author":"M. Luk","year":"2007","unstructured":"Luk, M., Ghita, M., Perrig, A., Gligor, V.: Minisec: A Secure Sensor Network Communication Architecture. In: Abdelzaher, T.F., Guibas, L.J., Welsh, M. (eds.) IPSN 2007, pp. 479\u2013488. ACM Press, New York (2007)"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/SAHCN.2007.4292834","volume-title":"4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks","author":"K. Ren","year":"2007","unstructured":"Ren, K., Lou, W., Zhang, Y.: Multi-user Broadcast Authentication in Wireless Sensor Networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 223\u2013232. IEEE Computer Society, Los Alamitos (2007)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1288107.1288118","volume-title":"MobiHoc 2007","author":"R. Wang","year":"2007","unstructured":"Wang, R., Du, W., Ning, P.: Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks. In: Kranakis, E., Belding, E., Modiano, E. (eds.) MobiHoc 2007, pp. 71\u201379. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing in Sensor Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69170-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:30:45Z","timestamp":1620016245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69170-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540691693","9783540691709"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69170-9_7","relation":{},"subject":[]}}