{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:06:15Z","timestamp":1742799975840},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icnp.2009.5339674","type":"proceedings-article","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T14:36:24Z","timestamp":1259591784000},"page":"284-293","source":"Crossref","is-referenced-by-count":33,"title":["Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Ming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Vishal","family":"Khanapure","sequence":"additional","affiliation":[]},{"given":"Shigang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xuelian","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550353"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.55"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2008.82"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288131"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"journal-title":"FIPS PUB 186-3","article-title":"digital signature standard","year":"2006","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.26"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"3","article-title":"a randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks","author":"conti","year":"2007","journal-title":"Proc of ACM Mobihoc"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905824"},{"journal-title":"Sensor node","year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"10","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","article-title":"an identity based encryption scheme based on quadratic residues","author":"cocks","year":"2001","journal-title":"Proc of IMA International Conference on Cryptography and Coding"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/313239.313282"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497902"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354686"},{"key":"9","article-title":"efficient algorithms for pairing-based cryptosystems","author":"barreto","year":"2002","journal-title":"Proc of CRYPTO"},{"key":"8","article-title":"identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc of CRYPTO"}],"event":{"name":"2009 17th IEEE International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2009,10,13]]},"location":"Plainsboro, NJ, USA","end":{"date-parts":[[2009,10,16]]}},"container-title":["2009 17th IEEE International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5335585\/5339659\/05339674.pdf?arnumber=5339674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T23:56:46Z","timestamp":1558655806000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5339674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnp.2009.5339674","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}