{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:07:48Z","timestamp":1764238068228},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_8","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T06:30:40Z","timestamp":1270621840000},"page":"106-121","source":"Crossref","is-referenced-by-count":29,"title":["Design and Analysis of a Generalized Canvas Protocol"],"prefix":"10.1007","author":[{"given":"Mari\u00e1n","family":"Novotn\u00fd","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/360204.360213","volume-title":"Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 104\u2013115. ACM, New York (2001)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., et al.: The Avispa Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"issue":"4","key":"8_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B. Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security\u00a017(4), 363\u2013434 (2009)","journal-title":"Journal of Computer Security"},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/CSFW.2001.930138","volume-title":"Proceedings of 14th IEEE Computer Security Foundations Workshop","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE Computer Society, Washington (2001)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/11556985_47","volume-title":"Computer Aided Systems Theory \u2013 EUROCAST 2005","author":"D. Gollmann","year":"2005","unstructured":"Gollmann, D.: Protocol analysis for concrete environments. In: Moreno D\u00edaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol.\u00a03643, pp. 365\u2013372. Springer, Heidelberg (2005)"},{"key":"8_CR6","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorshot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-0-387-74899-3_9","volume-title":"Wireless Sensor and Actor Networks. IFIP","author":"L. Tobarra","year":"2008","unstructured":"Tobarra, L., et al.: Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP. In: Orozco-Barbosa, L., et al. (eds.) Wireless Sensor and Actor Networks. IFIP, vol.\u00a0248, pp. 95\u2013106. Springer, Boston (2008)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-30496-8_3","volume-title":"Security in Ad-hoc and Sensor Networks","author":"H. Vogt","year":"2005","unstructured":"Vogt, H.: Exploring Message Authentication in Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 19\u201330. Springer, Heidelberg (2005)"},{"key":"8_CR9","first-page":"179","volume-title":"Proceedings of the Second International Workshop on Security in Distributed Computing Systems (ICDCSW 2005)","author":"H. Vogt","year":"2005","unstructured":"Vogt, H.: Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks. In: Proceedings of the Second International Workshop on Security in Distributed Computing Systems (ICDCSW 2005), vol.\u00a02, pp. 179\u2013184. IEEE Computer Society, Washington (2005)"},{"key":"8_CR10","unstructured":"Vogt, H.: Integrity preservation for communication in sensor networks. Technical Report 434, Institute for Pervasive Computing. ETH Z\u00fcrich (2004)"},{"key":"8_CR11","series-title":"Signals and Communication Technology Series","first-page":"403","volume-title":"Wireless Sensor Networks and Applications","author":"Y. Xiao","year":"2008","unstructured":"Xiao, Y., Du, X.: A Survey on Sensor Network Security. In: Li, Y., et al. (eds.) Wireless Sensor Networks and Applications. Signals and Communication Technology Series, pp. 403\u2013421. Springer, Heidelberg (2008)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Transactions on Sensor Networks\u00a03(3), article 14 (2007)","DOI":"10.1145\/1267060.1267062"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T12:22:09Z","timestamp":1711369329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}