{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:43:57Z","timestamp":1771616637601,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462125","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"179-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Countermeasures against sybil attacks in WSN based on proofs-of-work"],"prefix":"10.1145","author":[{"given":"Marek","family":"Klonowski","sequence":"first","affiliation":[{"name":"Wroclaw University of Technology, Wroclaw, Poland"}]},{"given":"MichaB","family":"Koza","sequence":"additional","affiliation":[{"name":"Wroclaw University of Technology, Wroclaw, Poland"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hashcash - a denial of service counter-measure. Technical report","author":"Back A.","year":"2002","unstructured":"A. Back . Hashcash - a denial of service counter-measure. Technical report , 2002 . A. Back. Hashcash - a denial of service counter-measure. Technical report, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11946441_26"},{"key":"e_1_3_2_1_3_1","volume-title":"A survey of solutions to the sybil attack","author":"Brian Neil Levine C. S.","year":"2006","unstructured":"C. S. Brian Neil Levine and N. B. Margolin . A survey of solutions to the sybil attack , 2006 . C. S. Brian Neil Levine and N. B. Margolin. A survey of solutions to the sybil attack, 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"Exponential memory-bound functions for proof of work protocols","author":"Coelho F.","year":"2005","unstructured":"F. Coelho . Exponential memory-bound functions for proof of work protocols , 2005 . F. Coelho. Exponential memory-bound functions for proof of work protocols, 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.162"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.04.010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400767"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C.\n      Dwork\n     and \n      M.\n      Naor\n  . \n  Pricing via processing or combatting junk mail\n  . In E. F. Brickell editor CRYPTO volume \n  740\n   of \n  Lecture Notes in Computer Science pages \n  139\n  --\n  147\n  . \n  Springer 1992\n  .   C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E. F. Brickell editor CRYPTO volume 740 of Lecture Notes in Computer Science pages 139--147. Springer 1992.","DOI":"10.1007\/3-540-48071-4_10"},{"key":"e_1_3_2_1_11_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-77566-9","volume-title":"Novy Smokovec","author":"Geffert V.","year":"2008","unstructured":"V. Geffert , J. Karhumaki , A. Bertoni , B. Preneel , P. Navrat , and M. Bielikova , editors . SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science , Novy Smokovec , Slovakia, January 19-25, 2008 , Proceedings, volume 4910 of Lecture Notes in Computer Science . Springer , 2008. V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors. SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Novy Smokovec, Slovakia, January 19-25, 2008, Proceedings, volume 4910 of Lecture Notes in Computer Science. Springer, 2008."},{"key":"e_1_3_2_1_12_1","first-page":"2009","author":"Gilbert S.","year":"2009","unstructured":"S. Gilbert , R. Guerraoui , D. Kowalski , and C. Newport . Interference-Resilient Information Exchange. In IEEE InfoCom 2009 , 2009 . S. Gilbert, R. Guerraoui, D. Kowalski, and C. Newport. Interference-Resilient Information Exchange. In IEEE InfoCom 2009, 2009.","journal-title":"Interference-Resilient Information Exchange. In IEEE InfoCom"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04383-3_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/645608.662013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926211.1926240"},{"key":"e_1_3_2_1_17_1","first-page":"720","volume-title":"Geffert et al. {11}","author":"Klonowski M.","unstructured":"M. Klonowski and T. Struminski . Proofs of communication and its application for fighting spam . In Geffert et al. {11} , pages 720 -- 730 . M. Klonowski and T. Struminski. Proofs of communication and its application for fighting spam. In Geffert et al. {11}, pages 720--730."},{"key":"e_1_3_2_1_18_1","first-page":"720","volume-title":"Geffert et al. {11}","author":"Klonowski M.","unstructured":"M. Klonowski and T. Struminski . Proofs of communication and its application for fighting spam . In Geffert et al. {11} , pages 720 -- 730 . M. Klonowski and T. Struminski. Proofs of communication and its application for fighting spam. In Geffert et al. {11}, pages 720--730."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"M. Kuty\n       lowski and W. \n      Rutkowski\n  . \n  Adversary immune leader election in ad hoc radio networks\n  . In G. D. Battista and U. Zwick editors ESA volume \n  2832\n   of \n  Lecture Notes in Computer Science pages \n  397\n  --\n  408\n  . \n  Springer 2003\n  .  M. Kuty lowski and W. Rutkowski. Adversary immune leader election in ad hoc radio networks. In G. D. Battista and U. Zwick editors ESA volume 2832 of Lecture Notes in Computer Science pages 397--408. Springer 2003.","DOI":"10.1007\/978-3-540-39658-1_37"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209181"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360253"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","first-page":"209","volume-title":"K.-Y","author":"Nakano K.","year":"1998","unstructured":"K. Nakano and S. Olariu . Randomized o (log log n)-round leader election protocols in packet radio networks . In K.-Y . Chwa and O. H. Ibarra, editors, ISAAC, volume 1533 of Lecture Notes in Computer Science , pages 209 -- 218 . Springer , 1998 . K. Nakano and S. Olariu. Randomized o (log log n)-round leader election protocols in packet radio networks. In K.-Y. Chwa and O. H. Ibarra, editors, ISAAC, volume 1533 of Lecture Notes in Computer Science, pages 209--218. Springer, 1998."},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/3-540-40996-3_31","volume-title":"D. T. Lee and S.-H","author":"Nakano K.","year":"2000","unstructured":"K. Nakano and S. Olariu . Randomized leader election protocols in radio networks with no collision detection . In D. T. Lee and S.-H . Teng, editors, ISAAC, volume 1969 of Lecture Notes in Computer Science , pages 362 -- 373 . Springer , 2000 . K. Nakano and S. Olariu. Randomized leader election protocols in radio networks with no collision detection. In D. T. Lee and S.-H. Teng, editors, ISAAC, volume 1969 of Lecture Notes in Computer Science, pages 362--373. Springer, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215032"}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Budapest Hungary","acronym":"WISEC'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":27,"alternative-id":["10.1145\/2462096.2462125","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462125","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}