{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:38:31Z","timestamp":1725619111976},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245497"},{"type":"electronic","value":"9783642245503"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24550-3_28","type":"book-chapter","created":{"date-parts":[[2011,10,8]],"date-time":"2011-10-08T06:56:37Z","timestamp":1318056997000},"page":"371-385","source":"Crossref","is-referenced-by-count":2,"title":["Using Zero Knowledge to Share a Little Knowledge: Bootstrapping Trust in Device Networks"],"prefix":"10.1007","author":[{"given":"Ingy","family":"Ramzy","sequence":"first","affiliation":[]},{"given":"Anish","family":"Arora","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Anshul, D., Roy, S.: A zero-knowledge-proof identification scheme for base nodes in wireless sensor networks. In: ACM Symposium on Applied Computing, pp. 319\u2013323 (2005)","key":"28_CR1","DOI":"10.1145\/1066677.1066754"},{"unstructured":"Aronssona, H.A.: Zero knowledge protocols and small systems, http:\/\/www.tml.hut.fi\/Opinnot\/Tik-110.501\/1995\/zeroknowledge.html","key":"28_CR2"},{"unstructured":"Arora, A., Sang, L.: Dialog codes for secure wireless communications. In: IPSN, pp. 13\u201324 (2009)","key":"28_CR3"},{"doi-asserted-by":"crossref","unstructured":"Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for rfid-tags. In: PerCom Workshops, pp. 217\u2013222 (2007)","key":"28_CR4","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/3-540-48071-4_28","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 390\u2013420. Springer, Heidelberg (1993)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Chung, A., Roedig, U.: DHB-KEY: An efficient key distribution scheme for wireless sensor networks. In: Proceedings of the 4th IEEE International Workshop on Wireless and Sensor Networks Security, WSNS 2008 (2008)","key":"28_CR7","DOI":"10.1109\/MAHSS.2008.4660127"},{"doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(208) (1989)","key":"28_CR8","DOI":"10.1137\/0218012"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L.C. Guillou","year":"1990","unstructured":"Guillou, L.C., Quisquater, J.: A Paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 216\u2013231. Springer, Heidelberg (1990)"},{"issue":"1","key":"28_CR10","first-page":"9","volume":"4","author":"J.M. Kizza","year":"2010","unstructured":"Kizza, J.M.: Feige-fiat-shamir zkp scheme revisited. International Journal of Computing and ICT Research\u00a04(1), 9\u201319 (2010)","journal-title":"International Journal of Computing and ICT Research"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-642-03944-7_9","volume-title":"WISTP","author":"C. Lederer","year":"2009","unstructured":"Lederer, C., Mader, R., Koschuch, M., Gro\u00dfsch\u00e4dl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 112\u2013127. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245\u2013256 (2008)","key":"28_CR12","DOI":"10.1109\/IPSN.2008.47"},{"doi-asserted-by":"crossref","unstructured":"Malan, D.J., Welsh, M., Smith, M.D.: Implementing public-key infrastructure for sensor networks. TOSN\u00a04(4) (2008)","key":"28_CR13","DOI":"10.1145\/1387663.1387668"},{"doi-asserted-by":"crossref","unstructured":"Munivel, E., Ajit, G.M.: Efficient public key infrastructure implementation in wireless sensor networks. In: ICWCSC, pp. 1\u20136 (2010)","key":"28_CR14","DOI":"10.1109\/ICWCSC.2010.5415904"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 31\u201353. Springer, Heidelberg (1993)"},{"doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R.R., Tygar, J.D., Song, D.: The tesla broadcast authentication protocol. In: CryptoBytes, pp. 2\u201313 (2002)","key":"28_CR16","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-540-73408-6_22","volume-title":"Public Key Infrastructure","author":"R. Roman","year":"2007","unstructured":"Roman, R., Alcaraz, C.: Applicability of public key infrastructures in wireless sensor networks. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 313\u2013320. Springer, Heidelberg (2007)"},{"unstructured":"Sang, L., Arora, A.: A shared-secret free security infrastructure for wireless networks. To appear in ACM Transactions on Autonomous and Adaptive Systems","key":"28_CR18"},{"unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: CRYPTO (1990)","key":"28_CR19"},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P. Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"28_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. 1355\u20131387 (1975)","key":"28_CR22","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24550-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T20:28:59Z","timestamp":1639081739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24550-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642245497","9783642245503"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24550-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}