{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:08:20Z","timestamp":1725570500427},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642179938"},{"type":"electronic","value":"9783642179945"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17994-5_22","type":"book-chapter","created":{"date-parts":[[2010,11,29]],"date-time":"2010-11-29T07:01:50Z","timestamp":1291014110000},"page":"328-343","source":"Crossref","is-referenced-by-count":3,"title":["Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"22_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"L. Akyildiz","year":"2002","unstructured":"Akyildiz, L., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013116 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Chang, S., Shieh, S., Lin, W., Hsieh, C.-M.: An Efficient Broadcast Authentication Scheme. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 311\u2013320 (2006)","DOI":"10.1145\/1128817.1128864"},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.comcom.2007.10.017","volume":"31","author":"X. Cao","year":"2008","unstructured":"Cao, X., Kou, W., Dang, L., Zhao, B.: IMBAS: Identity-Based Multi-User Broadcast Authentication in Wireless Sensor Networks. Computer Communications\u00a031(4), 659\u2013667 (2008)","journal-title":"Computer Communications"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45682-1_10","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N. Courtois","year":"2001","unstructured":"Courtois, N., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 157\u2013174. Springer, Heidelberg (2001)"},{"key":"22_CR6","unstructured":"Crossbow Technology Inc.: MICAz \u2013 Wireless Measurement System, http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Q., Liu, D., Ning, P.: Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 2\u201312 (2008)","DOI":"10.1145\/1352533.1352536"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 30\u201335 (2008)","DOI":"10.1145\/1352533.1352539"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Drissi, J., Gu, Q.: Localized Broadcast Authentication in Large Sensor Networks. In: Proceedings of the International Conference on Networking and Services (ICNS 2006), pp. 25\u201331 (2006)","DOI":"10.1109\/ICNS.2006.72"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, pp. 245\u2013256 (2008)","DOI":"10.1109\/IPSN.2008.47"},{"issue":"4","key":"22_CR11","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D. Liu","year":"2004","unstructured":"Liu, D., Ning, P.: Multi-Level \u03bcTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems\u00a03(4), 800\u2013836 (2004)","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 118\u2013129 (2005)","DOI":"10.1109\/MOBIQUITOUS.2005.49"},{"key":"22_CR13","unstructured":"L\u00f3pez, J., Aranha, D., C\u00e2mara, D., Dahab, R., Oliveira, L., Lopes, C.: Fast Implementation of Elliptic Curve Cryptography and Pairing Computation for Sensor Networks. In: The 13th Workshop on Elliptic Curve Cryptography (ECC 2009), http:\/\/ecc.math.ucalgary.ca\/sites\/ecc.math.ucalgary.ca\/files\/u5\/Lopez_ECC2009.pdf"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: Proceedings of the Fourth ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 147\u2013156 (2006)","DOI":"10.1145\/1180345.1180364"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1325651.1325652","volume":"4","author":"P. Ning","year":"2008","unstructured":"Ning, P., Liu, A., Du, W.: Mitigate DOS Attacks Against Broadcast Authentication in Wireless Sensor Networks. ACM Transactions on Sensor Networks\u00a04(1), 1:1\u20131:35 (2008)","journal-title":"ACM Transactions on Sensor Networks"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proceedings of the 8th ACM conference on Computer and Communications Security (CCS 2001), pp. 28\u201337 (2001)","DOI":"10.1145\/501983.501988"},{"issue":"5","key":"22_CR17","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. ACM Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"ACM Wireless Networks"},{"issue":"11","key":"22_CR18","doi-asserted-by":"publisher","first-page":"4136","DOI":"10.1109\/TWC.2007.060255","volume":"6","author":"K. Ren","year":"2007","unstructured":"Ren, K., Lou, W., Zeng, K., Moran, P.J.: On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications\u00a06(11), 4136\u20134144 (2007)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Ren, K., Yu, S., Lou, W., Zhang, Y.: Multi-user Broadcast Authentication in Wireless Sensor Networks. To appear in IEEE Transactions on Vehicular Technology (2009)","DOI":"10.1142\/9789812833495_0015"},{"issue":"5","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1093\/ietisy\/e91-d.5.1338","volume":"91","author":"S.C. Seo","year":"2008","unstructured":"Seo, S.C., Han, D.-G., Song, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implemenation over GF(2 m ) on 8-bit Micaz Mote. IEICE Transactions on Information and Systems\u00a0E91-D(5), 1338\u20131347 (2008)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"5","key":"22_CR21","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1587\/transinf.E92.D.909","volume":"92","author":"M. Shirase","year":"2009","unstructured":"Shirase, M., Miyazaki, Y., Takagi, T., Han, D.-G., Choi, D.: Efficient Implementation of Pairing Based Cryptography on a Sensor Node. IEICE Transactions on Information and Systems\u00a0E92-D(5), 909\u2013917 (2009)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing Based Cryptography to Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009), pp. 1\u201312 (2009)","DOI":"10.1145\/1514274.1514276"},{"key":"22_CR23","unstructured":"Texas Instrument Inc. 2.4 GHz IEEE 802.15.4\/ZigBee-ready RF Transceiver, http:\/\/focus.ti.com\/lit\/ds\/symlink\/cc2420.pdf"},{"issue":"3","key":"22_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1341731.1341733","volume":"11","author":"Q. Zhang","year":"2008","unstructured":"Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions in Information and Systems Security (TISSEC)\u00a011(3), 1\u201337 (2008)","journal-title":"ACM Transactions in Information and Systems Security (TISSEC)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17994-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T12:50:22Z","timestamp":1559825422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17994-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642179938","9783642179945"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17994-5_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}