{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T04:13:00Z","timestamp":1742875980377,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_17","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:10:23Z","timestamp":1333339823000},"page":"245-258","source":"Crossref","is-referenced-by-count":2,"title":["Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Kazuya","family":"Izawa","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R. Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Transactions on Information Theory\u00a046(4), 1204\u20131216 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","volume-title":"Applied Cryptography and Network Security","author":"S. Agrawal","year":"2009","unstructured":"Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-Based Integrity for Network Coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 292\u2013305. Springer, Heidelberg (2009)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Apavatjrut, A., Znaidi, W., Fraboulet, A., Goursaud, C., Lauradoux, C., Minier, M.: Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. In: NSS 2010, pp. 223\u2013230 (2010)","DOI":"10.1109\/NSS.2010.32"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: ACM Conference on Computer and Communications Security 2009, pp. 187\u2013198 (2009)","DOI":"10.1145\/1653662.1653686"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal Classes of Hash Functions. J. Comput. Syst. Sci.\u00a018(2), 143\u2013154 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dong, Q., Wu, J., Hu, W., Crowcroft, J.: Practical network coding in wireless networks. In: MOBICOM 2007, pp. 306\u2013309 (2007)","DOI":"10.1145\/1287853.1287891"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586115.586117"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.: Cooperative Security for Network Coding File Distribution. In: INFOCOM 2006 (2006)","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-540-85174-5_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"H. Handschuh","year":"2008","unstructured":"Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 144\u2013161. Springer, Heidelberg (2008)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., Medard, M., Crowcroft, J.: XORs in the air: practical wireless network coding. In: SIGCOMM 2006, pp. 243\u2013254 (2006)","DOI":"10.1145\/1159913.1159942"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Kuo, F.-C., Tan, K., Li, X., Zhang, J., Fu, X.: XOR Rescue: Exploiting Network Coding in Lossy Wireless Networks. In: SECON 2009, pp. 1\u20139 (2009)","DOI":"10.1109\/SAHCN.2009.5168982"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y., Yao, H., Chen, M., Jaggi, S., Rosen, A.: RIPPLE Authentication for Network Coding. In: INFOCOM 2010, pp. 2258\u20132266 (2010)","DOI":"10.1109\/INFCOM.2010.5462051"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Nage, T., Yu, F.R., St-Hilaire, M.: Adaptive Control of Packet Overhead in XOR Network Coding. In: ICC 2010, pp. 1\u20135 (2010)","DOI":"10.1109\/ICC.2010.5502770"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"V. Shoup","year":"1996","unstructured":"Shoup, V.: On Fast and Provably Secure Message Authentication Based on Universal Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 313\u2013328. Springer, Heidelberg (1996)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. In: INFOCOM 2009, pp. 406\u2013414 (2009)","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, S., Liew, S.C., Lam, P.P.: Hot topic: physical-layer network coding. In: MOBICOM, pp. 358\u2013365 (2006)","DOI":"10.1145\/1161089.1161129"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Lv, T., Su, X., Gao, H.: Dual XOR in the Air: A Network Coding Based Retransmission Scheme for Wireless Broadcasting. In: ICC 2011, pp. 1\u20136 (2011)","DOI":"10.1109\/icc.2011.5963121"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:50:42Z","timestamp":1742845842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}