{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:45:29Z","timestamp":1762505129964,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128864","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"311-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["An efficient broadcast authentication scheme in wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Shang-Ming","family":"Chang","sequence":"first","affiliation":[{"name":"National Chiao Tung University \/ University of California, Berkeley, Hsinchu, Taiwan"}]},{"given":"Shiuhpyng","family":"Shieh","sequence":"additional","affiliation":[{"name":"National Chiao Tung University \/ University of California, Berkeley, Hsinchu, Taiwan"}]},{"given":"Warren W.","family":"Lin","sequence":"additional","affiliation":[{"name":"National Chiao Tung University \/ University of California, Berkeley, Hsinchu, Taiwan"}]},{"given":"Chih-Ming","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Institute for Information Industry, Taipei, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet Society","author":"Pannetrat A.","year":"2003","unstructured":"A. Pannetrat and R. Molva , \" Efficient multicast packet authentication,\" In Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003) , Internet Society , Feb. 2003 . A. Pannetrat and R. Molva, \"Efficient multicast packet authentication,\" In Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003), Internet Society, Feb. 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_1_3_1","volume-title":"Better than BiBa: Short onetime signatures with fast signing and verifying,\" In Seventh Australasian Conference on Information Security and Privacy (ACISP","author":"Reyzin L.","year":"2002","unstructured":"L. Reyzin and N. Reyzin , \" Better than BiBa: Short onetime signatures with fast signing and verifying,\" In Seventh Australasian Conference on Information Security and Privacy (ACISP 2002 ), July 2002. L. Reyzin and N. Reyzin, \"Better than BiBa: Short onetime signatures with fast signing and verifying,\" In Seventh Australasian Conference on Information Security and Privacy (ACISP 2002), July 2002."},{"key":"e_1_3_2_1_4_1","first-page":"227","article-title":"Efficient multicast packet authentication using signature amortization","author":"Park J. M.","year":"2002","unstructured":"J. M. Park , E. K. Chong , and H. J. Siegel , \" Efficient multicast packet authentication using signature amortization ,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 227 -- 240 , May 2002 . J. M. Park, E. K. Chong, and H. J. Siegel, \"Efficient multicast packet authentication using signature amortization,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 227--240, May 2002.","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"e_1_3_2_1_5_1","volume-title":"The 11th Annual Network and Distributed System Security Symposium","author":"Karlof C.","year":"2004","unstructured":"C. Karlof , N. Sastry , and Yaping Li , \" Distillation Codes and Applications to DoS Resistant Multicast Authentication ,\" The 11th Annual Network and Distributed System Security Symposium , February 2004 . C. Karlof, N. Sastry, and Yaping Li, \"Distillation Codes and Applications to DoS Resistant Multicast Authentication,\" The 11th Annual Network and Distributed System Security Symposium, February 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"SRI International","author":"Lamport L","year":"1979","unstructured":"L Lamport , \"Constructing digital signatures from one-way function,\" Technical Report SRI-CSL-98 , SRI International , October 1979 . L Lamport, \"Constructing digital signatures from one-way function,\" Technical Report SRI-CSL-98, SRI International, October 1979."},{"key":"e_1_3_2_1_7_1","first-page":"369","volume-title":"CRYPTO'87","author":"Merkle R.","year":"1987","unstructured":"R. Merkle , \" A Digital Signature Based on a Conventional Encryption Function,\" Proc . CRYPTO'87 , LNCS 293, Springer Verlag , pp 369 -- 378 , 1987 . R. Merkle, \"A Digital Signature Based on a Conventional Encryption Function,\" Proc. CRYPTO'87, LNCS 293, Springer Verlag, pp 369--378, 1987."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705190"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Merkle \"Protocols for public key cryptosystems \" In Proceedings of the IEEE Symposium on Research in Security and Privacy \" pp. 122--134 Apr. 1980.  R. Merkle \"Protocols for public key cryptosystems \" In Proceedings of the IEEE Symposium on Research in Security and Privacy \" pp. 122--134 Apr. 1980.","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"M.\n      Bellare\n     and \n      P.\n      Rogaway \"\n  Collision-resistant hashing: Towards making UOWHFs practical \" In Advances in Cryptology -- CRYPTO '97 volume \n  1294\n   of \n  Lecture Notes in Computer Science pp. \n  470\n  --\n  484 1997\n  .   M. Bellare and P. Rogaway \"Collision-resistant hashing: Towards making UOWHFs practical \" In Advances in Cryptology -- CRYPTO '97 volume 1294 of Lecture Notes in Computer Science pp. 470--484 1997.","DOI":"10.1007\/BFb0052256"},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Society","author":"Golle P.","year":"2001","unstructured":"P. Golle and N. Modadugu , \" Authenticating streamed data in the presence of random packet loss,\" In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pp. 13--22 , Internet Society , Feb. 2001 . P. Golle and N. Modadugu, \"Authenticating streamed data in the presence of random packet loss,\" In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pp. 13--22, Internet Society, Feb. 2001."},{"key":"e_1_3_2_1_12_1","first-page":"232","article-title":"Graph-based authentication of digital streams","author":"Miner S.","year":"2001","unstructured":"S. Miner and J. Staddon , \" Graph-based authentication of digital streams ,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 232 -- 246 , May 2001 . S. Miner and J. Staddon, \"Graph-based authentication of digital streams,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 232--246, May 2001.","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"e_1_3_2_1_13_1","first-page":"155","volume-title":"Foundations of Secure Computation","author":"Rabin M. O.","year":"1978","unstructured":"M. O. Rabin , \" Digitalized signatures,\" In Richard A. Demillo , David P. Dobkin , Anita K. Jones , and Richard J. Lipton , editors , Foundations of Secure Computation , pp. 155 -- 168 . Academic Press , 1978 . M. O. Rabin, \"Digitalized signatures,\" In Richard A. Demillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Foundations of Secure Computation, pp. 155--168. Academic Press, 1978."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762480"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285258"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/263876.263881"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258573"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet Society","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , R. Canetti , D. Song , and J. D. Tygar , \" Efficient and secure source authentication for multicast,\" In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pp. 35--46 , Internet Society , Feb. 2001 . A. Perrig, R. Canetti, D. Song, and J. D. Tygar, \"Efficient and secure source authentication for multicast,\" In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pp. 35--46, Internet Society, Feb. 2001."},{"key":"e_1_3_2_1_20_1","first-page":"56","article-title":"Efficient authentication and signature of multicast streams over lossy channels","author":"Perrig A.","year":"2000","unstructured":"A. Perrig , R. Canetti , J. D. Tygar , and D. Song , \" Efficient authentication and signature of multicast streams over lossy channels ,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 56 -- 73 , May 2000 . A. Perrig, R. Canetti, J. D. Tygar, and D. Song, \"Efficient authentication and signature of multicast streams over lossy channels,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 56--73, May 2000.","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"e_1_3_2_1_21_1","first-page":"258","article-title":"Expander graphs for digital stream authentication and robust overlay networks","author":"Song D.","year":"2002","unstructured":"D. Song , D. Zuckerman , and J. D. Tygar , \" Expander graphs for digital stream authentication and robust overlay networks ,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 258 -- 270 , May 2002 . D. Song, D. Zuckerman, and J. D. Tygar, \"Expander graphs for digital stream authentication and robust overlay networks,\" In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 258--270, May 2002.","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"e_1_3_2_1_22_1","first-page":"198","volume-title":"Digital signatures for flows and multicasts,\" In Proceedings on the 6th International Conference on Network Protocols (ICNP '98)","author":"Wong C.","year":"1998","unstructured":"C. Wong and S. Lam , \" Digital signatures for flows and multicasts,\" In Proceedings on the 6th International Conference on Network Protocols (ICNP '98) , pp. 198 -- 209 , IEEE , October 1998 . C. Wong and S. Lam, \"Digital signatures for flows and multicasts,\" In Proceedings on the 6th International Conference on Network Protocols (ICNP '98), pp. 198--209, IEEE, October 1998."},{"issue":"3","key":"e_1_3_2_1_23_1","article-title":"The application of remote sensor technology to assist the recovery of rare and endangered species","volume":"16","author":"Biagioni E.","year":"2002","unstructured":"E. Biagioni and K. Bridges , \" The application of remote sensor technology to assist the recovery of rare and endangered species ,\" In Special issue on Distributed Sensor Networks for the International Journal of High Performance Computing Applications , Vol. 16 , N. 3 , August 2002 . E. Biagioni and K. Bridges, \"The application of remote sensor technology to assist the recovery of rare and endangered species,\" In Special issue on Distributed Sensor Networks for the International Journal of High Performance Computing Applications, Vol. 16, N. 3, August 2002.","journal-title":"Special issue on Distributed Sensor Networks for the International Journal of High Performance Computing Applications"},{"key":"e_1_3_2_1_24_1","volume-title":"January","author":"Biagioni E.","year":"2003","unstructured":"E. Biagioni and G. Sasaki , \" Wireless sensor placement for reliable and efficient data collection,\" In Proceedings of the Hawaiii International Conference on Systems Sciences , January 2003 . E. Biagioni and G. Sasaki, \"Wireless sensor placement for reliable and efficient data collection,\" In Proceedings of the Hawaiii International Conference on Systems Sciences, January 2003."},{"key":"e_1_3_2_1_25_1","volume-title":"Emerging systems challenges,\" In NSF Workshop on Distributed Communications and Signal Processing","author":"Estrin D.","year":"2002","unstructured":"D. Estrin , \" Embedded networked sensing research : Emerging systems challenges,\" In NSF Workshop on Distributed Communications and Signal Processing , Northwestern University , December 2002 . D. Estrin, \"Embedded networked sensing research: Emerging systems challenges,\" In NSF Workshop on Distributed Communications and Signal Processing, Northwestern University, December 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313556"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":26,"alternative-id":["10.1145\/1128817.1128864","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128864","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}