{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:45:25Z","timestamp":1725543925268},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117220"},{"type":"electronic","value":"9783642117237"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11723-7_12","type":"book-chapter","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T13:30:55Z","timestamp":1264167055000},"page":"176-191","source":"Crossref","is-referenced-by-count":0,"title":["Security and Privacy in a Sensor-Based Search and Rescue System"],"prefix":"10.1007","author":[{"given":"Jyh-How","family":"Huang","sequence":"first","affiliation":[]},{"given":"John","family":"Black","sequence":"additional","affiliation":[]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"802.11-based tracking system, http:\/\/www.pangonetworks.com\/locator.htm"},{"key":"12_CR2","unstructured":"Personal locator beacons with GPS receiver and satellite transmitter, http:\/\/www.aeromedix.com\/"},{"key":"12_CR3","unstructured":"Personal tracking using GPS and GSM system, http:\/\/www.ulocate.com\/trimtrac.html"},{"key":"12_CR4","unstructured":"Rf based kid tracking system, http:\/\/www.ion-kids.com\/"},{"key":"12_CR5","unstructured":"Jaskowski, W., Jedrzejek, K., Nyczkowski, B., Skowronek, S.: Lifetch life saving system. In: CSIDC (2004)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Huang, J.-H., Amjad, S., Mishra, S.: CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses. In: SenSys 2005 (2005)","DOI":"10.1145\/1098918.1098938"},{"key":"12_CR7","unstructured":"Open source big number operation and RSA library, http:\/\/www.dimgt.com.au\/bigdigits.html"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPU. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Huang, J., Jiang, L., Kamthe, A., Freeman, I., Ledbetter, J., Mishra, S., Han, R., Cerpa, A.: SenSearch: GPS and witness assisted tracking system for delay tolerant sensor networks. TR 1045-08, Computer Science, CU-Boulder (2008)","DOI":"10.1007\/978-3-642-04383-3_19"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008 (2008)","DOI":"10.1109\/IPSN.2008.47"},{"key":"12_CR11","unstructured":"Luo, X., Zheng, K., Pan, Y., Wu, Z.: Encryption algorithm comparison for wireless sensor networks. In: Proceedings of the International Conference on Systems, Man and Cybernetics (2004)"},{"key":"12_CR12","unstructured":"Vitaletti, A., Palombizio, G.: Rijndael for sensor networks:Is speed the main issue. In: WCNC 2006 (2006)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/11935308_37","volume-title":"Information and Communications Security","author":"H. Wang","year":"2006","unstructured":"Wang, H., Li, Q.: Efficient implementations of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 519\u2013528. Springer, Heidelberg (2006)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing sensor networks with public key cryptography. In: SASN 2004 (2004)","DOI":"10.1145\/1029102.1029113"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11723-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T09:08:26Z","timestamp":1558775306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11723-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117220","9783642117237"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11723-7_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}