{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:30:57Z","timestamp":1725489057418},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_3","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"3-12","source":"Crossref","is-referenced-by-count":13,"title":["ZigBee Security Using Identity-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Son Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Blaser, M.: Enabling Security in Industrial Wireless Sensor Networks. Industrial Embedded Systems (2006)"},{"key":"3_CR2","unstructured":"Blaser, M.: Industrial-strength Security for ZigBee: The Case for Public-key Cryptography. Embedded Computing Design (2005)"},{"key":"3_CR3","unstructured":"Blaser, M.: Securing ZigBee: Building Robust, Reliable Sensor Networks. Portable Design (2006)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","first-page":"382","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identity-based Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 382\u2013398. Springer, Heidelberg (2003)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, pp. 26\u201328 (2001)","DOI":"10.1007\/3-540-45325-3_32"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Direction in Cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G. Frey","year":"1999","unstructured":"Frey, G., Muller, M., Ruck, H.: The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory\u00a045, 1717\u20131718 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-48910-X_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"R. Gennaro","year":"1999","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 295\u2013310. Springer, Heidelberg (1999)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Hegland, A.M, Winjum, E., Mjolsnes, S.F, Rong, C., Kure, O., Spilling, P.: A Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorial, 3rd Quarter, pp. 48\u201366 (2006)","DOI":"10.1109\/COMST.2006.253271"},{"key":"3_CR11","unstructured":"IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory\u00a039, 1639\u20131646 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR14","unstructured":"National Institute of Standards and Technology. http:\/\/www.nist.gov"},{"key":"3_CR15","unstructured":"Reddy, J.: ZigBee Security Specification Overview. ZigBee Open House presentation, Hong Kong (2005)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"3_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curve","author":"J. Silverman","year":"1986","unstructured":"Silverman, J.: The Arithmetic of Elliptic Curve. Springer, Heidelberg (1986)"},{"key":"3_CR19","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice-Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/11839569_51","volume-title":"Autonomic and Trusted Computing","author":"C. Veigner","year":"2006","unstructured":"Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol.\u00a04158, pp. 521\u2013530. Springer, Heidelberg (2006)"},{"key":"3_CR21","unstructured":"Wheeler, A.: ZigBee Wireless Networks for Industrial Systems. White Paper, http:\/\/www.microcontroller.com"},{"key":"3_CR22","unstructured":"ZigBee Alliance. http:\/\/www.zigbee.org"},{"key":"3_CR23","unstructured":"ZigBee Alliance. ZigBee Specification 1.1 (2005)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:55Z","timestamp":1605762955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}