{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:12Z","timestamp":1725490212169},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540732747"},{"type":"electronic","value":"9783540732754"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73275-4_11","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T23:13:37Z","timestamp":1187824417000},"page":"142-155","source":"Crossref","is-referenced-by-count":0,"title":["\u201cEnd-by-Hop\u201d Data Integrity"],"prefix":"10.1007","author":[{"given":"Stephen","family":"Farrell","sequence":"first","affiliation":[]},{"given":"Christian D.","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: MobiCom 2000. Proceedings of 6th International Conference on Mobile Computing and Networking, Boston, Massachusetts, pp. 56\u201367 (2000)","DOI":"10.1145\/345910.345920"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Krishnamachari, B., Estrin, D., Wicker, S.: The impact of data aggregation in wireless sensor networks. In: Proceedings of the International Workshop on Distributed Event-Based Systems, Vienna, Austria, pp. 575\u2013578 (2002)","DOI":"10.1109\/ICDCSW.2002.1030829"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cristescu, R., Beferull-Lozano, B., Vetterli, M.: On network correlated data gathering. In: Proceedings of INFOCOM, Hong Kong (2004)","DOI":"10.1109\/INFCOM.2004.1354677"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Esler, M., Hightower, J., Anderson, T.E., Boriello, G.: Next century challenges: Data-centric networking for invisible computing. In: MobiCom 1999. Proceedings of the 5th International Conference on Mobile Computing and Networking, Seatle, Washington, pp. 256\u2013262 (1999)","DOI":"10.1145\/313451.313553"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/502034.502049","volume-title":"SOSP 2001","author":"J.S. Heidemann","year":"2001","unstructured":"Heidemann, J.S., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building efficient wireless sensor networks with low-level naming. In: SOSP 2001. Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada, pp. 146\u2013159. ACM Press, New York (2001)"},{"key":"11_CR6","unstructured":"Chatterjea, S., Havinga, P.: A dynamic data aggregation scheme for wireless sensor networks. In: ProRisc 2003. Proceedings of the 14th Annual Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands (2003)"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1029102.1029116","volume-title":"SASN 2004","author":"D. Wagner","year":"2004","unstructured":"Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, pp. 78\u201387. ACM Press, New York (2004)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: Diffie-hellman key agreement method. RFC 2631, IETF Network Working Group (1999)","DOI":"10.17487\/rfc2631"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 92\u2013111. Springer, Heidelberg (1995)"},{"key":"11_CR11","unstructured":"Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1). Input for Committee ISO\/IEC JTC 1\/SC 27 (2001)"},{"key":"11_CR12","unstructured":"Ask Dr. Math FAQ : Permutations and combinations (April 15, 2006), Web-site last visited http:\/\/mathforum.org\/dr.math\/faq\/faq.comb.perm.html"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: Hmac: Keyed-hashing for message authentication. RFC 2104, IETF Network Working Group (1997)","DOI":"10.17487\/rfc2104"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: Spins: Security protocols for sensor networks. In: Proceedings of the 7th International Conference on Mobile Computing and Networking (MobiCom 2001), Rome, Italy, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM\u00a047, 53\u201357 (2004)","journal-title":"Communications of the ACM"},{"key":"11_CR16","first-page":"139","volume-title":"WETICE 2002","author":"S. Slijepcevic","year":"2002","unstructured":"Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. In: WETICE 2002. Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, Pennsylvania, pp. 139\u2013144. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"11_CR17","volume-title":"Proceedings of IEEE INFOCOM 2004","author":"F. Ye","year":"2004","unstructured":"Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route detection and filtering of injected false data in sensor networks. In: Proceedings of IEEE INFOCOM 2004, Hong Kong, IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"11_CR18","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: A survey of two signature aggregation techniques. RSA\u2019s CryptoBytes, vol. 6 (2003)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology \u2013 EUROCRPYT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"key":"11_CR20","series-title":"NATO Science Series: Computer & Systems Sciences","volume-title":"Security And Privacy In Advanced Networking Technologies","author":"S. Farrell","year":"2004","unstructured":"Farrell, S., Seigneur, J.M., Jensen, C.D.: Security in exotic wireless networks. In: Jerman-Bla\u017ei\u010d, B., Schneider, W., Klobucar, T. (eds.) Security And Privacy In Advanced Networking Technologies. NATO Science Series: Computer & Systems Sciences, vol.\u00a0193, IOS Press, Amsterdam (2004)"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Ad-hoc and Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73275-4_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:07:00Z","timestamp":1619503620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73275-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540732747","9783540732754"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73275-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}