{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:14:40Z","timestamp":1725786880119},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/srds.2007.31","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T17:06:13Z","timestamp":1209402373000},"page":"219-230","source":"Crossref","is-referenced-by-count":76,"title":["Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks"],"prefix":"10.1109","author":[{"given":"Yi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xinran","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.2"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"journal-title":"ESAS","article-title":"Remote software-based attestation for wireless sensors","year":"2005","author":"shaneck","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353383"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"journal-title":"ICA DSN","article-title":"The sleep deprivation attack in sensor networks: Analysis and methods of defense","year":"2005","author":"pirretti","key":"13"},{"key":"14","first-page":"1","article-title":"Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms","author":"seshadri","year":"2005","journal-title":"SOSP"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"journal-title":"Leap Efficient security mechanisms for large-scale distributed sensor networks","year":"0","author":"zhu","key":"21"},{"journal-title":"MICA Motes","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.31"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"alfred","key":"2"},{"journal-title":"Time-of-check-to-time-of-use(TOCTTOU)","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813603"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"6","first-page":"339","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","author":"herzberg","year":"1995","journal-title":"Crypto '95"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029115"},{"key":"4","first-page":"289","article-title":"A practical study of transitory master key establishment for wireless sensor networks","author":"deng","year":"2005","journal-title":"SecureComm 2005"},{"key":"9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Mobicom"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"}],"event":{"name":"2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)","start":{"date-parts":[[2007,10,10]]},"location":"Beijing, China","end":{"date-parts":[[2007,10,12]]}},"container-title":["2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4365668\/4365669\/04365698.pdf?arnumber=4365698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:30:21Z","timestamp":1497771021000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4365698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/srds.2007.31","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}