{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:24:12Z","timestamp":1726410252458},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_6","type":"book-chapter","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T00:58:40Z","timestamp":1376960320000},"page":"68-80","source":"Crossref","is-referenced-by-count":0,"title":["An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Mourier","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Reinhard","family":"Stampp","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Falko","family":"Strenzke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Contiki home page, \n                    \n                      http:\/\/www.contiki-os.org\/"},{"key":"6_CR2","unstructured":"Mspsim home page, \n                    \n                      http:\/\/sourceforge.net\/apps\/mediawiki\/mspsim\/index.php?title=Main_Page"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks\u00a038, 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/11964254_3","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"L. Batina","year":"2006","unstructured":"Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost elliptic curve cryptography for wireless sensor networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.\u00a04357, pp. 6\u201317. Springer, Heidelberg (2006)"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1093\/comjnl\/bxm046","volume":"51","author":"S. Croce","year":"2008","unstructured":"Croce, S., Marcelloni, F., Vecchio, M.: Reducing power consumption in wireless sensor networks using a novel approach to data aggregation. Comput. J.\u00a051(2), 227\u2013239 (2008)","journal-title":"Comput. J."},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-642-10433-6_31","volume-title":"Cryptology and Network Security","author":"E. Dahmen","year":"2009","unstructured":"Dahmen, E., Krau\u00df, C.: Short hash-based signatures for wireless sensor networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 463\u2013476. Springer, Heidelberg (2009)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11586821_8","volume-title":"Cryptography and Coding","author":"C. Dods","year":"2005","unstructured":"Dods, C., Smart, N.P., Stam, M.: Hash based digital signature schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 96\u2013115. Springer, Heidelberg (2005)"},{"key":"6_CR8","unstructured":"Osterlind, A.D.F.: Contiki programming course: Hands-on session notes. Swedish Institute of Computer Science, Siena (2009)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/PERCOMW.2005.76","volume-title":"Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005","author":"G. Gaubatz","year":"2005","unstructured":"Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005, pp. 146\u2013150. IEEE Computer Society, Washington, DC (2005)"},{"key":"6_CR10","unstructured":"Netsim homepage, \n                    \n                      http:\/\/tetcos.com\/"},{"key":"6_CR11","unstructured":"Cooja homepage, \n                    \n                      http:\/\/www.sics.se\/contiki\/wiki\/index.php\/Cooja"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-89862-7_22","volume-title":"Information Systems Security","author":"D. Jinwala","year":"2008","unstructured":"Jinwala, D., Patel, D., Dasgupta, K.: Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 258\u2013272. Springer, Heidelberg (2008)"},{"issue":"17","key":"6_CR13","doi-asserted-by":"publisher","first-page":"2967","DOI":"10.1016\/j.comnet.2010.05.011","volume":"54","author":"J. Lee","year":"2010","unstructured":"Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw.\u00a054(17), 2967\u20132978 (2010)","journal-title":"Comput. Netw."},{"key":"6_CR14","unstructured":"Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1145\/872757.872817","volume-title":"Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003","author":"S. Madden","year":"2003","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The design of an acquisitional query processor for sensor networks. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003, pp. 491\u2013502. ACM, New York (2003)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/3-540-45661-9_4","volume-title":"Fast Software Encryption","author":"D. Moon","year":"2002","unstructured":"Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 49\u201360. Springer, Heidelberg (2002)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1180345.1180366","volume-title":"Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006","author":"K. Piotrowski","year":"2006","unstructured":"Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, pp. 169\u2013176. ACM, New York (2006)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P. Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"6_CR20","unstructured":"Wheeler, D., Needham, R.: Tea extensions (1997) (unpublished)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"Fast Software Encryption","author":"D. Wheeler","year":"1995","unstructured":"Wheeler, D., Needham, R.: Tea, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 363\u2013366. Springer, Heidelberg (1995)"},{"key":"6_CR22","unstructured":"Yarrkov, E.: Cryptanalysis of xxtea. Cryptology ePrint Archive, Report 2010\/254 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-00862-7_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"D.H. Yum","year":"2009","unstructured":"Yum, D.H., Seo, J.W., Eom, S., Lee, P.J.: Single-layer fractal hash chain traversal with almost optimal complexity. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 325\u2013339. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T09:20:46Z","timestamp":1548667246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}