{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:47Z","timestamp":1725514367407},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_11","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T05:27:19Z","timestamp":1181021239000},"page":"116-128","source":"Crossref","is-referenced-by-count":2,"title":["Secure Feedback Service in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Di","family":"Ma","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: ACM CCS\u201906 (Nov. 2006)","DOI":"10.1145\/1180405.1180440"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Barr, K., Asanovic, K.: Energy aware lossless data compression. In: Proc. of MobiSys\u201903, San Francisco, CA (May 2003)","DOI":"10.1145\/1066116.1066123"},{"issue":"7","key":"11_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time tradeoffs in hash coding with allowable errors. Communication of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communication of the ACM"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature scheme based on the gap-Diffe-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., et al.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","first-page":"193","volume-title":"Security in Communication Networks","author":"S. Jarecki","year":"2005","unstructured":"Jarecki, S., et al.: A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 193\u2013207. Springer, Heidelberg (2005)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless networks. In: Mobile and Ubiquitous Systems: Networking and Services MobiQuitous 2005 (July 2005)","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"11_CR8","unstructured":"Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad Hoc Networks (2003)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Lin, W., Chang, S.M., Shieh, S.P.: An efficient broadcast authentication scheme in wireless sensor networks. In: ASIACCS (2006)","DOI":"10.1145\/1128817.1128864"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Intanagonwiwat, C., et al.: Impact of network density on data aggregation in wireless sensor networks. In: ICDCS\u201902, pp. 457\u2013458 (2002)","DOI":"10.1109\/ICDCS.2002.1022289"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","first-page":"465","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"R. Ostrovsky","year":"2006","unstructured":"Ostrovsky, R., et al.: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 465\u2013485. Springer, Heidelberg (2006)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","first-page":"245","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., et al.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 245\u2013254. Springer, Heidelberg (2004)"},{"issue":"SI","key":"11_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/844128.844142","volume":"36","author":"S. Madden","year":"2002","unstructured":"Madden, S., et al.: TAG: a tiny aggregation services for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev.\u00a036(SI), 131\u2013146 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"11_CR14","unstructured":"McCune, J., et al.: Detection of Denial-of-Message Attacks on Sensor Network Broadbasts. In: IEEE Symposium on Security and Privacy (2005)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures. In: Proc. of CCS 2001, pp. 234\u2013254 (2001)","DOI":"10.1145\/501983.502017"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Mitzenmacher, M.: Compressed bloom filters. IEEE\/ACM Trans. on Networks, 613-620 (Oct. 2002)","DOI":"10.1109\/TNET.2002.803864"},{"issue":"4","key":"11_CR17","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems\u00a06(4), 432\u2013441 (1998)","journal-title":"ACM Trans. Computer Systems"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Park, S., et al.: A scalable approach for reliable downstream data delivery in wireless sensor networks. In: MobiHoc 2004, May 24-26 (2004)","DOI":"10.1145\/989459.989470"},{"issue":"5","key":"11_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., et al.: SPINS: Security protocols for sensor networks. Wirel. Netw.\u00a08(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Wagner, D.: Resilient aggregation in sensor networks. In: Workshops on Security of Ad Hoc and Sensor Networks (2004)","DOI":"10.1145\/1029102.1029116"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Yang, Y., et al.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: ACM MOBIHOC\u201906 (May 2006)","DOI":"10.1145\/1132905.1132944"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:29:16Z","timestamp":1605745756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_11","relation":{},"subject":[]}}