{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:05:16Z","timestamp":1774551916347,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1029102.1029113","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"59-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":387,"title":["TinyPK"],"prefix":"10.1145","author":[{"given":"Ronald","family":"Watro","sequence":"first","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]},{"given":"Derrick","family":"Kong","sequence":"additional","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]},{"given":"Sue-fen","family":"Cuti","sequence":"additional","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]},{"given":"Charles","family":"Gardiner","sequence":"additional","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]},{"given":"Charles","family":"Lynn","sequence":"additional","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]},{"given":"Peter","family":"Kruus","sequence":"additional","affiliation":[{"name":"BBN Technologies, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSMSD.2000.836452"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science #2152","first-page":"262","volume-title":"NTRU in Constrained Devices,\" in Proceedings of 2001 Conference of Cryptographic Hardware and Embedded Systems (CHES)","author":"Bailey D.V.","unstructured":"D.V. Bailey , D. Coffin , A. Elbirt , J. H. Silverman and A.D. Woodbury , \" NTRU in Constrained Devices,\" in Proceedings of 2001 Conference of Cryptographic Hardware and Embedded Systems (CHES) , Lecture Notes in Computer Science #2152 , pp. 262 -- 272 .]] D.V. Bailey, D. Coffin, A. Elbirt, J. H. Silverman and A.D. Woodbury, \"NTRU in Constrained Devices,\" in Proceedings of 2001 Conference of Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science #2152, pp. 262--272.]]"},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"Boneh D.","year":"1999","unstructured":"D. Boneh , \" Twenty years of attacks on the RSA cryptosystem ,\" Notices of the American Mathematical Society (AMS) , Vol. 46 , No. 2 , pp. 203 -- 213 , 1999 .]] D. Boneh, \"Twenty years of attacks on the RSA cryptosystem,\" Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203--213, 1999.]]","journal-title":"Notices of the American Mathematical Society (AMS)"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Fast variants of RSA,\" in RSA Laboratories' Cryptobytes, vol 5 no. 1","author":"Boneh D.","year":"2002","unstructured":"D. Boneh and H. Shacham , \" Fast variants of RSA,\" in RSA Laboratories' Cryptobytes, vol 5 no. 1 , pages 1 -- 8 , Winter\/Spring 2002 .]] D. Boneh and H. Shacham, \"Fast variants of RSA,\" in RSA Laboratories' Cryptobytes, vol 5 no. 1, pages 1--8, Winter\/Spring 2002.]]"},{"key":"e_1_3_2_1_6_1","unstructured":"Crossbow Technology Inc. \"Mote In-Network Programming User Reference \" http:\/\/www.xbow.com\/Support\/Support_pdf_files\/Xnp.pdf.]]  Crossbow Technology Inc. \"Mote In-Network Programming User Reference \" http:\/\/www.xbow.com\/Support\/Support_pdf_files\/Xnp.pdf.]]"},{"key":"e_1_3_2_1_7_1","first-page":"349","volume-title":"IPSN 2003","author":"Deng J.","year":"2003","unstructured":"J. Deng , R. Han , and S. Mishra , \" A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks,\" in F. Zhao and L. Guibas (Eds.) , IPSN 2003 , LNCS 2634, Springer-Verlag , pp. 349 -- 364 , 2003 .]] J. Deng, R. Han, and S. Mishra, \"A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks,\" in F. Zhao and L. Guibas (Eds.), IPSN 2003, LNCS 2634, Springer-Verlag, pp.349--364, 2003.]]"},{"key":"e_1_3_2_1_8_1","first-page":"22","article-title":"New Directions in Cryptography","author":"Diffie W.","unstructured":"W. Diffie and M.E. Hellman , \" New Directions in Cryptography ,\" IEEE Transactions on Information Theory , vol. I T- 22 , no. 6, pp. 644--654\", 1976.]] W. Diffie and M.E. Hellman, \"New Directions in Cryptography,\" IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644--654\", 1976.]]","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_9_1","first-page":"2004","article-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs","author":"Gura N.","year":"2004","unstructured":"N. Gura , A. Patel , A. Wander , H. Eberle , and S. C. Shantz , \" Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs ,\" Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004 ), Boston, August 2004 .]] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, \"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,\" Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Boston, August 2004.]]","journal-title":"Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_3_2_1_11_1","volume-title":"April","author":"Horton M.","year":"2002","unstructured":"M. Horton , D. Culler , K.S.J. Pister , J. Hill , R. Szewczyk , and A. Woo , \" MICA: The Commercialization of Microsensor Motes,\" Sensor , April 2002 .]] M. Horton, D. Culler, K.S.J. Pister, J. Hill, R. Szewczyk, and A. Woo, \"MICA: The Commercialization of Microsensor Motes,\" Sensor, April 2002.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_13_1","volume-title":"Nov.","author":"Kong J.","year":"2001","unstructured":"J. Kong , P. Zerfos , H. Luo , S. Lu , and L. Zhang , \" Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,\" 9th International Conference on Network Protocols , Nov. 2001 .]] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, \"Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,\" 9th International Conference on Network Protocols, Nov. 2001.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings Crypto 2000","author":"Lenstra A.K.","year":"1880","unstructured":"A.K. Lenstra and E.R. Verheul , The XTR public key system , Proceedings Crypto 2000 , LNCS 1880 , Springer-Verlag , 2000.]] A.K. Lenstra and E.R. Verheul, The XTR public key system, Proceedings Crypto 2000, LNCS 1880, Springer-Verlag, 2000.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"TR-04-04","author":"Malan D.","year":"2004","unstructured":"D. Malan , Crypto for Tiny Objects , TR-04-04 , Computer Science Group , Harvard University , 2004 .]] D. Malan, Crypto for Tiny Objects, TR-04-04, Computer Science Group, Harvard University, 2004.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029102.1029113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029102.1029113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:24:36Z","timestamp":1750263876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029102.1029113"}},"subtitle":["securing sensor networks with public key technology"],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":17,"alternative-id":["10.1145\/1029102.1029113","10.1145\/1029102"],"URL":"https:\/\/doi.org\/10.1145\/1029102.1029113","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}