{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T11:10:03Z","timestamp":1746097803516,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642452482"},{"type":"electronic","value":"9783642452499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-45249-9_21","type":"book-chapter","created":{"date-parts":[[2014,1,2]],"date-time":"2014-01-02T11:08:11Z","timestamp":1388660891000},"page":"317-331","source":"Crossref","is-referenced-by-count":0,"title":["A Fault Tolerant Parallel Computing Scheme of Scalar Multiplication for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yanbo","family":"Shou","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Guyennet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks\u00a038(4), 393\u2013422 (2002)","journal-title":"Computer Networks"},{"issue":"12","key":"21_CR2","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J. Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks\u00a052(12), 2292\u20132330 (2008)","journal-title":"Computer Networks"},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2006.26","volume":"10","author":"G. Werner-Allen","year":"2006","unstructured":"Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing\u00a010(2), 18\u201325 (2006)","journal-title":"IEEE Internet Computing"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Kim, S., Pakzad, S., Culler, D., Demmel, J., Fenves, G., Glaser, S., Turon, M.: Wireless sensor networks for structural health monitoring. In: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pp. 427\u2013428. ACM (2006)","DOI":"10.1145\/1182807.1182889"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Baker, C.R., Armijo, K., Belka, S., Benhabib, M., Bhargava, V., Burkhart, N., Der Minassians, A., Dervisoglu, G., Gutnik, L., Haick, M.B., et al.: Wireless sensor networks for home health care. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINA 2007, vol.\u00a02, pp. 832\u2013837. IEEE (2007)","DOI":"10.1109\/AINAW.2007.376"},{"key":"21_CR6","unstructured":"Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, vol.\u00a05 (2004)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Gosnell, T., Hall, J., Jam, C., Knapp, D., Koenig, Z., Luke, S., Pohl, B., Schach von Wittenau, A., Wolford, J.: Gamma-ray identification of nuclear weapon materials. Technical report, Lawrence Livermore National Lab, Livermore, CA, US (1997)","DOI":"10.2172\/16135"},{"key":"21_CR8","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1201\/9780849379253-20","volume":"1","author":"J.P. Walters","year":"2007","unstructured":"Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A survey. Security in Distributed, Grid, Mobile, and Pervasive Computing\u00a01, 367 (2007)","journal-title":"Security in Distributed, Grid, Mobile, and Pervasive Computing"},{"issue":"3","key":"21_CR9","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y. Zhou","year":"2008","unstructured":"Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials\u00a010(3), 6\u201328 (2008)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"1","key":"21_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-35668-1_21","volume-title":"Distributed Computing and Networking","author":"Y. Shou","year":"2013","unstructured":"Shou, Y., Guyennet, H., Lehsaini, M.: Parallel scalar multiplication on elliptic curves in wireless sensor networks. In: Frey, D., Raynal, M., Sarkar, S., Shyamasundar, R.K., Sinha, P. (eds.) ICDCN 2013. LNCS, vol.\u00a07730, pp. 300\u2013314. Springer, Heidelberg (2013)"},{"issue":"177","key":"21_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit cPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"21_CR16","unstructured":"Hankerson, D., Vanstone, S., Menezes, A.: Guide to elliptic curve cryptography. Springer-Verlag New York Inc. (2004)"},{"issue":"6","key":"21_CR17","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C.H. Lim","year":"1994","unstructured":"Lim, C.H., Lee, P.J.: More flexible exponentiation with precomputation. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 95\u2013107. Springer, Heidelberg (1994)"},{"issue":"10","key":"21_CR19","first-page":"146","volume":"2","author":"S. Mishra","year":"2012","unstructured":"Mishra, S., Jena, L., Pradhan, A.: Fault tolerance in wireless sensor networks. International Journal\u00a02(10), 146\u2013153 (2012)","journal-title":"International Journal"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M., Bezdek, J.C.: Distributed anomaly detection in wireless sensor networks. In: 10th IEEE Singapore International Conference on Communication systems, ICCS 2006, pp. 1\u20135. IEEE (2006)","DOI":"10.1109\/ICCS.2006.301508"},{"key":"21_CR21","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1, D., Jajodia, S. (eds.) Applications of Data Mining in Computer Security. Advances in Information Security, vol.\u00a06, pp. 77\u2013101. Springer, US (2002)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Chen, J., Kher, S., Somani, A.: Distributed fault detection of wireless sensor networks. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks, pp. 65\u201372. ACM (2006)","DOI":"10.1145\/1160972.1160985"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Gupta, G., Younis, M.: Fault-tolerant clustering of wireless sensor networks. In: 2003 IEEE Wireless Communications and Networking, WCNC 2003, pp. 1579\u20131584. IEEE (2003)","DOI":"10.1109\/WCNC.2003.1200622"},{"key":"21_CR24","unstructured":"Raj, R., Ramesh, M.V., Kumar, S.: Fault tolerant clustering approaches in wireless sensor network for landslide area monitoring. In: Proceedings of the 2008 International Conference on Wireless Networks (ICWN 2008), vol.\u00a01, pp. 107\u2013113 (2008)"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Koushanfar, F., Potkonjak, M., Sangiovanni-vincentelli, A.: Fault tolerance in wireless sensor networks. In: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems (2004)","DOI":"10.1201\/9780203489635.ch36"},{"key":"21_CR26","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. IEEE (2000)"},{"key":"21_CR27","first-page":"15","volume-title":"Proceedings of the International Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks Santa Fe","author":"T.R. Burchfield","year":"2007","unstructured":"Burchfield, T.R., Venkatesan, S., Weiner, D.: Maximizing throughput in zigbee wireless networks through analysis, simulations and implementations. In: Proceedings of the International Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks Santa Fe, pp. 15\u201329. Citeseer, New Mexico (2007)"},{"issue":"4","key":"21_CR28","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"W.B. Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H., et al.: An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications\u00a01(4), 660\u2013670 (2002)","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45249-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T10:31:07Z","timestamp":1746095467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45249-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642452482","9783642452499"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45249-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}