{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T22:10:15Z","timestamp":1742767815171,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291388"},{"type":"electronic","value":"9783642291395"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29139-5_17","type":"book-chapter","created":{"date-parts":[[2012,3,23]],"date-time":"2012-03-23T17:24:46Z","timestamp":1332523486000},"page":"194-205","source":"Crossref","is-referenced-by-count":5,"title":["Evolutionary Design of Message Efficient Secrecy Amplification Protocols"],"prefix":"10.1007","author":[{"given":"Tobi\u00e1\u0161","family":"Smolka","sequence":"first","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]},{"given":"Luk\u00e1\u0161","family":"Sekanina","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Anderson, D.: Boinc: A system for public-resource computing and storage. In: Proceedings of Fifth IEEE\/ACM International Workshop on Grid Computing, pp. 4\u201310. IEEE (2004)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: ICNP 2004, pp. 206\u2013215. IEEE (2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bernardi, P., S\u00e1nchez, E., Schillaci, M., Squillero, G., Reorda, M.S.: An effective technique for minimizing the cost of processor software-based diagnosis in socs. In: IEEE DATE 2006: Design, Automation and Test in Europe, pp. 412\u2013417 (2006)","DOI":"10.1109\/DATE.2006.243795"},{"key":"17_CR4","unstructured":"Brameier, M., Banzhaf, W.: Linear Genetic Programming. Springer, Berlin (2007)"},{"key":"17_CR5","unstructured":"CrossBow: Telosb, http:\/\/www.willow.co.uk\/TelosB_Datasheet.pdf"},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.entcs.2005.09.043","volume":"157","author":"D. Cvrcek","year":"2006","unstructured":"Cvrcek, D., Svenda, P.: Smart dust security-key infection revisited. Electronic Notes in Theoretical Computer Science\u00a0157(3), 11\u201325 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks, pp. 41\u201347 (2002)","DOI":"10.1145\/586115.586117"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"\u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 225\u2013236. ACM (2009)","DOI":"10.1145\/1514274.1514306"}],"container-title":["Lecture Notes in Computer Science","Genetic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29139-5_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T21:43:55Z","timestamp":1742766235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29139-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291388","9783642291395"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29139-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}