{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:57:40Z","timestamp":1725537460116},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041884"},{"type":"electronic","value":"9783642041907"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04190-7_23","type":"book-chapter","created":{"date-parts":[[2009,9,2]],"date-time":"2009-09-02T07:45:42Z","timestamp":1251877542000},"page":"253-265","source":"Crossref","is-referenced-by-count":2,"title":["Public Key Signatures and Lightweight Security Solutions in a Wireless Environment"],"prefix":"10.1007","author":[{"given":"Dmitrij","family":"Lagutin","sequence":"first","affiliation":[]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Lagutin, D.: Redesigning Internet - The packet level authentication architecture. Licentiate\u2019s thesis, Helsinki University of Technology, Finland (2008)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-75496-1_25","volume-title":"Information Security","author":"B. Brumley","year":"2007","unstructured":"Brumley, B., Nyberg, K.: Differential properties of elliptic curves and blind signatures. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 376\u2013389. Springer, Heidelberg (2007)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"23_CR4","unstructured":"Barker, E., et al.: Recommendation for Key Management Part 1: General. National Institute of Standards and Technology, NIST Special Publication 800-57 (2007)"},{"key":"23_CR5","unstructured":"Forsten, J., J\u00e4rvinen, K., Skytt\u00e4, J.: Packet Level Authentication: Hardware Subtask Final Report. Technical report (2008), \n                      \n                        http:\/\/www.tcs.hut.fi\/Software\/PLA\/new\/doc\/PLA_HW_final_report.pdf\n                      \n                      \n                     (accessed February 4, 2009)"},{"key":"23_CR6","unstructured":"Altera: HardCopy Structured ASICs: technology for business (2009), \n                      \n                        http:\/\/www.altera.com\/products\/devices\/hardcopy\/hrd-index.html\n                      \n                      \n                     (accessed March 2, 2009)"},{"key":"23_CR7","unstructured":"Merkle, R.: Secrecy, authentication, and public key systems. Doctoral dissertation, Department of Electrical Engineering, Stanford University (1979)"},{"key":"23_CR8","unstructured":"Wong, C., Lam, S.: Digital signatures for flows and multicasts. In: Proceedings on the 6th International Conference on Network Protocols (ICNP 1998), pp. 198\u2013209 (1998)"},{"key":"23_CR9","unstructured":"Lundberg, J.: A Wireless Multicast Delivery Architecture for Mobile Terminals. Doctoral dissertation, Department of Computer Science, Helsinki University of Technology (2006)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Hauser, R., et al.: Reducing the Cost of Security in Link State Routing. In: NDSS 1997 (1997)","DOI":"10.1109\/NDSS.1997.579226"},{"issue":"2","key":"23_CR11","first-page":"2","volume":"5","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA Broadcast Authentication Protocol. CryptoBytes\u00a05(2), 2\u201313 (2002)","journal-title":"CryptoBytes"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Heer, T., G\u00f6tz, S., Morchon, O.G., Wehrle, K.: ALPHA: An Adaptive and Lightweight Protocol for Hop-by-hop Authentication. In: Proceedings of ACM CoNEXT 2008 (2008)","DOI":"10.1145\/1544012.1544035"},{"key":"23_CR13","unstructured":"Zhong, L.: Make \u201csense\u201d for Computing. Public presentation (2008), \n                      \n                        http:\/\/www.ece.rice.edu\/corp\/annualmtg\/mtgarchive\/2008archive\/lzhong_affil08.pdf\n                      \n                      \n                     (accessed February 5, 2009)"},{"issue":"3","key":"23_CR14","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s11276-006-0726-6","volume":"14","author":"E. Jung","year":"2007","unstructured":"Jung, E., Vaidya, N.H.: Improving IEEE 802.11 power saving mechanism. Wireless Networks\u00a014(3), 375\u2013391 (2007)","journal-title":"Wireless Networks"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Qiao, D., et al.: Interference analysis and transmit power control in IEEE 802.11a\/h wireless LANs. IEEE\/ACM Transactions on Networking\u00a015(5) (2007)","DOI":"10.1109\/TNET.2007.900381"},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1145\/1151690.1151692","volume":"24","author":"K.C. Barr","year":"2006","unstructured":"Barr, K.C., Asanovic, K.: Energy-aware lossless data compression. ACM Transactions on Computer Systems\u00a024(3), 250\u2013291 (2006)","journal-title":"ACM Transactions on Computer Systems"},{"key":"23_CR17","unstructured":"Cisco: Voice Over IP - Per Call Bandwidth Consumption (2009), \n                      \n                        http:\/\/www.ciscosystems.com\/en\/US\/tech\/tk652\/tk698\/technologies_tech_note09186a0080094ae2.shtml\n                      \n                      \n                     (accessed February 10, 2009)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"J\u00e4rvinen, K., Skytt\u00e4, J.: High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves. In: Proceedings of the 16th IEEE Symposium on Field-programmable Custom Computing Machines, FCCM 2008, Palo Alto, California, USA (2008)","DOI":"10.1109\/FCCM.2008.30"},{"key":"23_CR19","unstructured":"International Technology Roadmap for Semiconductors (ITRS). ITRS 2008 (2008), \n                      \n                        http:\/\/www.itrs.net\/\n                      \n                      \n                     (accessed January 15, 2009)"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04190-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T16:58:04Z","timestamp":1552150684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04190-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041884","9783642041907"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04190-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}