{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:55:47Z","timestamp":1771332947964,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642358890","type":"print"},{"value":"9783642358906","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_19","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"258-273","source":"Crossref","is-referenced-by-count":4,"title":["\u03bcSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Amrita","family":"Ghosal","sequence":"first","affiliation":[]},{"given":"Sanjib","family":"Sur","sequence":"additional","affiliation":[]},{"given":"Sipra","family":"DasBit","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"19_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/356989.356998","volume":"35","author":"J. Hill","year":"2000","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System Architecture Directions for Networked Sensors. ACM SIGPLAN Notice\u00a035(11), 93\u2013104 (2000)","journal-title":"ACM SIGPLAN Notice"},{"issue":"6","key":"19_CR2","first-page":"53","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Setworks. Communications of the ACM, Special Issue on Wireless Sensor Networks\u00a047(6), 53\u201357 (2004)","journal-title":"Communications of the ACM, Special Issue on Wireless Sensor Networks"},{"issue":"2","key":"19_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11276-011-0393-0","volume":"18","author":"A. Ghosal","year":"2012","unstructured":"Ghosal, A., Halder, S., DasBit, S.: A Dynamic TDMA Based Scheme for Securing Query Processing in WSN. Wireless Networks\u00a018(2), 165\u2013184 (2012)","journal-title":"Wireless Networks"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. of 2nd Int\u2019l Conf. SenSys, pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proc. of 7th Int\u2019l Conf. MobiCom, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"19_CR6","unstructured":"Li, T., Wu, H. Wang, X., Bao, F.: SenSec Design. I 2R Sensor Network Flagship Project (SNFP: Security part). Technical Report-TR v1.0 (February 2005)"},{"key":"19_CR7","unstructured":"Xue, Q., Ganz, A.: Runtime Security Composition for Sensor Networks (SecureSense). In: Proc. of IEEE VTC, vol.\u00a05, pp. 2976\u20132980 (2003)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: Proc. of 6th Int\u2019l Conf. IPSN, pp. 479\u2013488 (2007)","DOI":"10.1109\/IPSN.2007.4379708"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In: Proc. of ACM Int\u2019l Conf. CCS, pp. 96\u2013205 (2001)","DOI":"10.1145\/501983.502011"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proc. of 38th Annual Symposium FOCS, pp. 394\u2013403 (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Housley, R., Whiting, D., Ferguson, N.: Counter with CBC-MAC (CCM), Submitted to N.I.S.T. (June 3, 2002), http:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/","DOI":"10.17487\/rfc3610"},{"key":"19_CR13","unstructured":"Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1996)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"David, R.R., Marchany, R.C., Midkiff, S.F.: Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. In: Proc. of IEEE Workshop on Information Assurance, pp. 127\u2013134 (2007)","DOI":"10.1109\/IAW.2007.381924"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"Fast Software Encryption","author":"D. Wheeler","year":"1995","unstructured":"Wheeler, D., Needham, R.: TEA, A Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 363\u2013366. Springer, Heidelberg (1995)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45708-9_1","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"S. Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.: Essential Algebraic Structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"19_CR17","unstructured":"Levis, P., Lee, N.: TOSSIM: A Simulator for TinyOS Networks. User\u2019s manual, in TinyOS Documentation (March 23, 2007)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Gay, D., Levis, P., Behren, R.V., Welsh, M., Brewer, E., Culler, D.: The nesC Language: A Holistic Approach to Network Embedded Systems. In: Proc. of Programming Language Design and Implementation, pp. 1\u201311 (2003)","DOI":"10.1145\/780822.781133"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:51:12Z","timestamp":1745945472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}