{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:22:11Z","timestamp":1742970131647,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":22,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_76","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"443-447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Sensor Network Security with RSL Codes"],"prefix":"10.1007","author":[{"given":"Chunyan","family":"Bai","sequence":"first","affiliation":[]},{"given":"Guiliang","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"76_CR1","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"Adrian Perrig","year":"2002","unstructured":"Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar, \u201cSpins: Security protocols for sensor networks\u201d, Wireless Networks, vol. 8, pp.521, 2002.","journal-title":"Wireless Networks"},{"key":"76_CR2","unstructured":"Ball Semiconductor Inc., \u201cMedical Applications\u201d, Benefits of Spherical Geometry, 1997."},{"key":"76_CR3","unstructured":"J. M. Kahn, R. H. Katz, and K. S. J. Pister, \u201cMobile networking for smart dust\u201d, ACM\/IEEE Intl. Conf. on Mobile Computing and Networking, Seattle, WA, August 1999, Mobicom 99."},{"key":"76_CR4","doi-asserted-by":"crossref","unstructured":"Yordan Kostov and Govind Rao, \u201cLow cost optical instrumentation for biomedical measurement\u201d, J. Review of Scientific Instruments, 2000.","DOI":"10.1063\/1.1319859"},{"key":"76_CR5","doi-asserted-by":"crossref","unstructured":"Weimerskirch and D. Westhoff, \u201cZero-Common Knowledge Authentication for Pervasive Networks\u201d, Proc. 10th Workshop Selected Areas in Cryptography (SAC \u201803), pp. 73, July 2003.","DOI":"10.1007\/978-3-540-24654-1_6"},{"key":"76_CR6","unstructured":"Weimerskirch and D. Westhoff, \u201cIdentity Certified Zero- Common Knowledge Authentication\u201d, Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN\u201903), Oct. 2003."},{"key":"76_CR7","unstructured":"Weimerskirch, D. Westhoff, S. Lucks, and E. Zenner, \u201cEfficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis\u201d, Sensor Network Operations, S. Phoha, T.F. La Porta, and C. Griffin, eds. Wiley-IEEE Press, May 20"},{"key":"76_CR8","doi-asserted-by":"crossref","unstructured":"G.L.Feng, R.H.Deng, F.Bao and J.C.Shen, \u201cNew Efficient MDS Array Codes for RAID Part I: Reed-Solomn-Like Codes for Tolerating Three Disk Failures\u201d, IEEE Transactions on Computer, vol. 54, no. 8, Sep. 2006.","DOI":"10.1109\/TC.2005.150"},{"key":"76_CR9","unstructured":"F.J. MacWilliams and N.J. A. Sloane, The Theory of Error-Correcting Codes, Elsevier Science Publishers B.V. 1977."},{"key":"76_CR10","doi-asserted-by":"crossref","unstructured":"Shafi Goldwasser and Silvio Micali, \u201cProbabilistic Encryption\u201d, Journal of Computer Security, vol. 28, 1984.","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"76_CR11","unstructured":"Neil Gross, \u201c21 ideas for the 21st century\u201d, Business Week, pp. 78\u00a8C167, Aug. 30, 1999."},{"key":"76_CR12","doi-asserted-by":"crossref","unstructured":"Perrig, J. Stankovic and D. Wagner, \u201cSecurity in Wireless Sensor Networks\u201d, Communications of ACM, vol. 47, No.6, 2004.","DOI":"10.1145\/990680.990707"},{"key":"76_CR13","doi-asserted-by":"crossref","unstructured":"G. Gaubatz, J.P. Kaps, and B. Sunar. \u201cPublic key cryptography in sensor networks \u2013 revisited\u201d, In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004.","DOI":"10.1007\/978-3-540-30496-8_2"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. \u201cComparing Elliptic Curve Cryptography and RSA on 8-bit CPUs\u201d. In 2004 workshop on Cryptographic Hardware and Embedded Systems, August 2004.","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"76_CR15","unstructured":"D. J. Malan, M. Welsh, and M. D. Smith. \u201cA public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography\u201d, First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON\u201904."},{"key":"76_CR16","series-title":"Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN\u201904)","first-page":"59","volume-title":"Tinypk: securing sensor networks with public key technology","author":"R. Watro","year":"2004","unstructured":"R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and et. Al., \u201cTinypk: securing sensor networks with public key technology\u201d, Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN\u201904), pages 59\u201364, New York, NY, USA, 2004. ACM Press."},{"key":"76_CR17","unstructured":"Y. Law, J. Doumen, and P. Hartel. \u201cSurvey and benchmark of block ciphers for wireless sensor networks\u201d, Technical Report TR-CTIT-04\u201307, Centre for Telematics and Information Technology, University of Twente, The Netherlands, 2004."},{"key":"76_CR18","doi-asserted-by":"crossref","unstructured":"P.Ganesan, R.Venugopalan and et.al., \u201cAnalyzing and Modeling Encryption Overhead for Sensor Network Nodes\u201d, Proceedings of Wireless Sensor Networks and Applications, WSNA\u201903, San Diego, CA, 2003.","DOI":"10.1145\/941350.941372"},{"key":"76_CR19","unstructured":"D.W.Carman and P.S. Krus and B.J. Matt, \u201cConstraints and Approaches for Distributed Sensor Network Security\u201d, Technical Report, NAI Labs, Security Research Division, Glenwood, MD, 2000."},{"key":"76_CR20","doi-asserted-by":"crossref","unstructured":"J. Hill, R. Szewczyk, A. Woo,D. Culler and K. Pister, \u201cSystem architecture directions for networked sensors\u201d, Proceedings of ACM, ASPLOS IX, November 2000.","DOI":"10.1145\/378993.379006"},{"key":"76_CR21","doi-asserted-by":"crossref","unstructured":"G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks, John Wiley and Sons, 2005.","DOI":"10.1002\/0470867574"},{"key":"76_CR22","unstructured":"W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Chapter 18, Prentice Hall, 2006."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T03:03:35Z","timestamp":1676689415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_76","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}