{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:42:28Z","timestamp":1725745348554},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_7","type":"book-chapter","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T00:58:40Z","timestamp":1376960320000},"page":"81-96","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications"],"prefix":"10.1007","author":[{"given":"Ji\u0159\u00ed","family":"K\u016fr","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: IFIP\/IEEE International Symposium on Integrated Network Management, IM 2009, pp. 315\u2013318 (June 2009)","DOI":"10.1109\/INM.2009.5188830"},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J. Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications\u00a029(2), 216\u2013230 (2006)","journal-title":"Computer Communications"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/2185677.2185735","volume-title":"Proceedings of the 11th International Conference on Information Processing in Sensor Networks, IPSN 2012","author":"X. Jiang","year":"2012","unstructured":"Jiang, X., Liang, C.-J.M., Chen, K., Zhang, B., Hsu, J., Liu, J., Cao, B., Zhao, F.: Design and evaluation of a wireless magnetic-based proximity detection platform for indoor applications. In: Proceedings of the 11th International Conference on Information Processing in Sensor Networks, IPSN 2012, pp. 221\u2013232. ACM, New York (2012)"},{"key":"7_CR4","first-page":"582","volume":"4","author":"D. Jinwala","year":"2009","unstructured":"Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. Journal of Information Assurance and Security\u00a04, 582\u2013603 (2009)","journal-title":"Journal of Information Assurance and Security"},{"key":"7_CR5","first-page":"599","volume-title":"ICDCS 2005","author":"P. Kamat","year":"2005","unstructured":"Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location privacy in sensor network routing. In: ICDCS 2005, pp. 599\u2013608. IEEE Computer Society, Washington, DC (2005)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1145\/1031495.1031515","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004","author":"C. Karlof","year":"2004","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162\u2013175. ACM, Baltimore (2004)"},{"key":"7_CR7","unstructured":"Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, pp. 142\u2013163. IOS Press (2008)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-25867-1_18","volume-title":"Security Protocols XIX","author":"J. K\u016fr","year":"2011","unstructured":"K\u016fr, J., Maty\u00e1\u0161, V., Stetsko, A., \u0160venda, P.: Attack detection vs. Privacy \u2013 how to find the link or how to hide it? In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols XIX. LNCS, vol.\u00a07114, pp. 189\u2013199. Springer, Heidelberg (2011)"},{"issue":"11","key":"7_CR9","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Luk, M., Mezzour, G., Perrig, A., Gligor, V.: Minisec: A secure sensor network communication architecture. In: 6th International Symposium on Information Processing in Sensor Networks, IPSN 2007, pp. 479\u2013488 (April 2007)","DOI":"10.1109\/IPSN.2007.4379708"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/1180345.1180364","volume-title":"Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006","author":"M. Luk","year":"2006","unstructured":"Luk, M., Perrig, A., Whillock, B.: Seven cardinal properties of sensor network broadcast authentication. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 147\u2013156. ACM, New York (2006)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 314\u2013323 (October 2007)","DOI":"10.1109\/ICNP.2007.4375862"},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"issue":"10","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.1093\/comjnl\/bxr055","volume":"54","author":"R. Rios","year":"2011","unstructured":"Rios, R., Lopez, J.: Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal\u00a054(10), 1603\u20131615 (2011)","journal-title":"The Computer Journal"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2003.1179560","volume":"41","author":"L.B. Ruiz","year":"2003","unstructured":"Ruiz, L.B., Nogueira, J.M.S., Loureiro, A.A.F.: MANNA: a management architecture for wireless sensor networks. IEEE Communications Magazine\u00a041(2), 116\u2013125 (2003)","journal-title":"IEEE Communications Magazine"},{"key":"7_CR16","unstructured":"Xue, Q., Ganz, A.: Runtime security composition for sensor networks (SecureSense). In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol.\u00a05, pp. 2976\u20132980 (October 2003)"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S. Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw.\u00a02(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sen. Netw."}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:49:33Z","timestamp":1558316973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}