{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:17:09Z","timestamp":1729649829710,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/ants.2013.6802851","type":"proceedings-article","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T21:20:50Z","timestamp":1399497650000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Soumya","family":"Basu","sequence":"first","affiliation":[]},{"given":"M.","family":"Pushpalatha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"European Research Project on Self-organizing and Collaborativeenergy- efficient Sensor Networks","year":"0","key":"19"},{"journal-title":"Collection Tree Protocol in TinyOS","year":"0","key":"17"},{"journal-title":"Routing Security Issues in Wireless Sensor Networks Attacks and Defences","year":"0","author":"sen","key":"18"},{"journal-title":"Tiny OS An Open-source OS for the Networked Sensor Regime","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"journal-title":"TinyECC Elliptic Curvecryptography for Sensor Networks (Version 2 0)","year":"0","author":"liu","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"ANSI X9 62-1998 Public KeyCryptography for the Financial Services Industry The Elliptic CurveDigital Signature Algorithm (ECDSA)","year":"1999","key":"12"},{"journal-title":"MICAz Wireless Measurement System","year":"0","key":"21"},{"year":"0","key":"20"},{"key":"22","article-title":"Performance evaluation for CAST and RC5 Encryptionalgorithms","author":"nie","year":"2010","journal-title":"Proceedings of International Conference OnComputing Control and Industrial Engineering (CCIE)"},{"journal-title":"WM-ECC An Ellipticcurve Cryptography Suite on Sensor Motes","year":"2007","author":"wang","key":"23"},{"journal-title":"Guide to Elliptic CurveCryptography","year":"2004","author":"hankerson","key":"24"},{"journal-title":"Standards for Efficient Cryptography SEC 1 Elliptic Curve Cryptography","year":"2000","key":"25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"2","first-page":"197","article-title":"Random key predistributionschemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Research InSecurity and Privacy"},{"key":"10","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2002","journal-title":"CryptoBytes"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311479"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/948109.948119","article-title":"Establishing pairwise keys in distributed sensornetworks","author":"liu","year":"2003","journal-title":"Proceedings of 10th ACM Conference on Computer AndCommunications Security (CCS'03)"},{"key":"4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","article-title":"A key-management scheme fordistributed sensor networks","author":"eschenauer","year":"2002","journal-title":"Proceedings of the 9th ACMConference on Computer and Communications Security"},{"key":"9","first-page":"521","article-title":"SPINS:Security protocols for sensor networks","author":"perrig","year":"2001","journal-title":"Proceedings of SeventhAnnual International Conference on Mobile Computing and Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.49"}],"event":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","start":{"date-parts":[[2013,12,15]]},"location":"Kattankulathur, India","end":{"date-parts":[[2013,12,18]]}},"container-title":["2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6776599\/6802829\/06802851.pdf?arnumber=6802851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T23:12:56Z","timestamp":1689203576000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6802851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ants.2013.6802851","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}