{"id":"https://openalex.org/W2007078174","doi":"https://doi.org/10.1109/iscc.2012.6249411","title":"LBTool: A stochastic toolkit for leave-based key updates","display_name":"LBTool: A stochastic toolkit for leave-based key updates","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2007078174","doi":"https://doi.org/10.1109/iscc.2012.6249411","mag":"2007078174"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2012.6249411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2012.6249411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028603638","display_name":"Ender Y\u00fcksel","orcid":"https://orcid.org/0000-0003-1307-2129"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Ender Yuksel","raw_affiliation_strings":["Department of Informatics, Technical University of Denmark, Denmark","Department of Informatics, Technical University of Denmark,"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark,","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012948241","display_name":"Hanne Riis Nielson","orcid":"https://orcid.org/0000-0002-2484-5580"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Hanne Riis Nielson","raw_affiliation_strings":["Department of Informatics, Technical University of Denmark, Denmark","Department of Informatics, Technical University of Denmark,"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark,","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089639449","display_name":"Flemming Nielson","orcid":"https://orcid.org/0000-0001-7362-6176"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Flemming Nielson","raw_affiliation_strings":["Department of Informatics, Technical University of Denmark, Denmark","Department of Informatics, Technical University of Denmark,"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark,","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037822300","display_name":"Bo Friis Nielsen","orcid":"https://orcid.org/0000-0001-9146-9733"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Bo Friis Nielsen","raw_affiliation_strings":["Department of Informatics, Technical University of Denmark, Denmark","Department of Informatics, Technical University of Denmark,"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Department of Informatics, Technical University of Denmark,","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028603638"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12006793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3920","issue":null,"first_page":"000868","last_page":"000875"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.8540403842926025},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8378665447235107},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5780013799667358},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.5532433986663818},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5478068590164185},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.542407214641571},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4732910990715027},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46164125204086304},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3819948732852936},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22204002737998962},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20266330242156982},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1210663914680481}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.8540403842926025},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8378665447235107},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5780013799667358},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.5532433986663818},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5478068590164185},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.542407214641571},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4732910990715027},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46164125204086304},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3819948732852936},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22204002737998962},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20266330242156982},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1210663914680481},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscc.2012.6249411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2012.6249411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/ddc8e907-5959-4f8e-bb4b-2024b66ef37c","is_oa":false,"landing_page_url":"https://orbit.dtu.dk/en/publications/ddc8e907-5959-4f8e-bb4b-2024b66ef37c","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yuksel , E , Nielson , H R , Nielson , F &amp; Nielsen , B F 2012 , LBTool: A stochastic toolkit for leave-based key updates . in 2012 IEEE Symposium on Computers and Communications . IEEE , pp. 868-875 , 2012 IEEE Symposium on Computers and Communications (ISCC) , Cappadocia , Turkey , 01/07/2012 . https://doi.org/10.1109/ISCC.2012.6249411","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1498125516","https://openalex.org/W1514324734","https://openalex.org/W1516256348","https://openalex.org/W1597805936","https://openalex.org/W1859458367","https://openalex.org/W2090311494","https://openalex.org/W2096899005","https://openalex.org/W2120469903","https://openalex.org/W2126093191","https://openalex.org/W2164096878","https://openalex.org/W6635673271","https://openalex.org/W6674569859"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W1976205134","https://openalex.org/W4248336175","https://openalex.org/W2031260042","https://openalex.org/W2391445434","https://openalex.org/W3009369890","https://openalex.org/W4312490297","https://openalex.org/W2062212388"],"abstract_inverted_index":{"Quantitative":[0],"techniques":[1,18],"have":[2],"been":[3],"successfully":[4],"employed":[5],"in":[6,22,68,93,142],"verification":[7],"of":[8,16,25,55,88],"information":[9],"and":[10,122,146],"communication":[11],"systems.":[12],"However,":[13],"the":[14,23,53,86,105,109,115,119,132,151,169],"use":[15,87],"such":[17,83,96],"are":[19],"still":[20],"rare":[21],"area":[24],"security.":[26],"In":[27],"this":[28],"paper,":[29],"we":[30],"present":[31],"a":[32,39,56,62,73,84,100],"toolkit":[33,158],"that":[34],"implements":[35],"transient":[36,116],"analysis":[37,48,117,152],"on":[38],"key":[40,58,75,80,164],"update":[41,76,165],"method":[42,77],"for":[43,72],"wireless":[44],"sensor":[45],"networks.":[46],"The":[47,157],"aims":[49],"to":[50,139,148,162],"find":[51],"out":[52],"probability":[54],"network":[57],"being":[59],"compromised":[60],"at":[61],"specific":[63,74],"time":[64,71,106],"point,":[65],"which":[66],"result":[67],"fluctuations":[69,120],"over":[70],"called":[78],"Leave-based":[79],"update.":[81],"For":[82],"problem,":[85],"current":[89],"tools":[90],"is":[91,111,128],"limited":[92],"many":[94],"ways":[95],"as":[97],"rapidly":[98],"constructing":[99],"compact":[101],"formal":[102],"model,":[103],"computing":[104],"point":[107],"where":[108],"risk":[110],"maximum,":[112],"or":[113],"terminating":[114],"after":[118],"disappear":[121],"system":[123],"stabilizes.":[124],"Our":[125],"toolkit,":[126],"LBTool,":[127],"not":[129],"only":[130],"resolving":[131],"above-mentioned":[133],"issues,":[134],"but":[135],"also":[136],"demonstrating":[137],"how":[138,147],"construct":[140],"models":[141],"an":[143],"analytical":[144,170],"way":[145],"speed":[149],"up":[150],"by":[153,167],"eliminating":[154],"redundant":[155],"computations.":[156],"can":[159],"be":[160],"generalized":[161],"other":[163],"methods":[166],"replacing":[168],"model":[171],"construction.":[172]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
