Entry Chang:2008:DAP from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Chang:2008:DAP,
author = "Katharine Chang and Kang G. Shin",
title = "Distributed Authentication of Program Integrity
Verification in Wireless Sensor Networks",
journal = j-TISSEC,
volume = "11",
number = "3",
pages = "14:1--14:??",
month = mar,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1341731.1341735",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:50 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Security in wireless sensor networks has become
important as they are being developed and deployed for
an increasing number of applications. The severe
resource constraints in each sensor make it very
challenging to secure sensor networks. Moreover,
sensors are usually deployed in hostile and unattended
environments and hence are susceptible to various
attacks, including node capture, physical tampering,
and manipulation of the sensor program. Park and Shin
[2005] proposed a soft tamper-proofing scheme that
verifies the integrity of the program in each sensor
device, called the program integrity verification
(PIV), in which sensors authenticate PIV servers
(PIVSs) using centralized and trusted third-party
entities, such as authentication servers (ASs). This
article presents a distributed authentication protocol
of PIVSs (DAPP) without requiring the commonly used
ASs. DAPP uses the Blundo scheme [Blundo et al. 1992]
for sensors and PIVSs to establish pairwise keys and
for PIVSs to authenticate one another. We also present
a protocol for PIVSs to cooperatively detect and revoke
malicious PIVSs in the network. We implement and
evaluate both DAPP and PIV on Mica2 Motes and laptops,
showing that DAPP reduces the sensors' communication
traffic in the network by more than 90\% and the energy
consumption on each sensor by up to 85\%, as compared
to the case of using a centralized AS for
authenticating PIVSs. We also analyze the security of
DAPP under various attack models, demonstrating its
capability in dealing with diverse types of attacks.",
acknowledgement = ack-nhfb,
articleno = "14",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "distributed authentication; node revocation; program
integrity verification; wireless sensor networks",
}
Related entries
- al.,
2(1)3,
2(1)34,
9(2)181,
9(4)461,
10(2)6,
10(4)5,
13(4)37,
14(3)27,
15(3)11,
16(3)10,
18(3)10
- analyze,
2(3)230,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- another,
1(1)26,
1(1)66,
11(3)13,
12(1)5,
12(3)18,
13(3)26,
13(4)36,
15(3)12,
15(4)18,
18(1)1
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- authenticate,
2(2)138,
13(4)39,
17(2)6
- authenticating,
2(2)138,
13(4)32,
18(3)11
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)230,
2(3)332,
2(4)354,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
14(4)29,
16(2)6,
16(2)8,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- become,
11(2)2,
12(3)14,
12(4)21,
13(4)36,
14(1)3,
14(3)25,
15(1)4,
16(2)7,
17(2)6,
17(4)15,
18(1)2
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)15,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1,
18(2)5
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- called,
1(1)3,
1(1)66,
2(1)105,
2(2)177,
2(3)269,
10(1)4,
11(1)3,
12(3)15,
13(1)10,
13(3)26,
13(3)27,
14(1)13,
14(4)28,
15(1)2,
15(2)9,
15(4)18,
16(2)6,
17(1)2,
17(3)10,
17(4)16,
18(1)3
- capability,
10(1)4,
10(4)2,
11(1)3,
11(2)2,
16(2)7,
16(4)13,
17(2)7,
17(3)9,
17(3)10
- capture,
2(2)159,
9(2)162,
10(4)6,
11(3)13,
15(2)10,
16(2)8,
17(3)11,
17(4)13
- case,
7(2)206,
9(4)391,
10(4)2,
11(4)19,
11(4)21,
12(1)1,
12(1)5,
12(2)10,
12(4)20,
13(4)32,
13(4)34,
14(1)14,
14(2)18,
14(4)28,
15(1)5,
15(2)7,
15(3)13,
16(1)4,
17(1)1,
17(2)7,
18(1)1,
18(1)2,
18(1)4
- centralized,
11(1)3
- challenging,
9(4)391,
10(4)3,
12(1)2,
13(3)20,
13(3)27,
15(2)9,
17(1)4
- commonly,
11(3)16,
13(1)10,
13(3)21,
16(2)7,
18(4)13
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- compared,
2(3)269,
12(1)3,
12(3)18,
15(4)17,
16(2)7,
17(3)10
- constraint,
2(1)65,
3(4)207,
6(4)501,
7(3)392,
9(2)162,
10(1)2,
10(2)5,
10(2)7,
10(4)2,
11(1)3,
11(2)6,
11(4)20,
12(2)8,
12(2)10,
12(3)19,
13(1)5,
13(3)22,
13(3)25,
13(4)40,
14(4)32,
15(2)10,
15(3)13,
15(4)15,
16(1)3,
16(1)4,
16(4)17,
17(1)3,
17(2)8,
18(2)6
- consumption,
9(2)162,
14(1)7
- dealing,
2(1)105,
12(1)5,
13(3)22
- demonstrating,
16(4)17
- deployed,
10(3)11,
13(3)26,
14(3)23,
15(1)2,
15(2)6,
15(3)13,
15(4)16,
17(3)9,
18(1)1
- detect,
2(3)295,
10(4)6,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(3)19,
14(1)13,
15(2)6,
16(2)5,
16(4)14,
17(4)16,
18(2)7,
18(3)9
- developed,
10(1)4,
10(2)7,
12(1)4,
13(3)26,
13(3)28,
14(1)6,
14(1)13,
15(3)13,
16(4)17,
17(1)3,
18(1)1,
18(2)8
- device,
2(3)230,
10(4)3,
10(4)4,
11(2)2,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- distributed,
2(1)34,
2(1)105,
2(2)159,
2(3)332,
4(2)103,
4(4)407,
6(1)128,
8(1)41,
9(1)1,
9(4)421,
10(2)7,
11(1)3,
11(1)4,
11(2)1,
12(1)1,
12(1)2,
12(2)8,
12(2)12,
13(2)16,
13(3)25,
14(1)3,
14(1)12,
14(3)27,
14(4)31,
15(2)6,
15(3)13,
16(4)14,
16(4)15,
17(4)13,
18(1)2,
18(2)6
- diverse,
1(1)66
- each,
2(1)65,
2(2)138,
2(4)390,
9(4)421,
9(4)461,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(4)18,
11(4)23,
12(1)6,
12(2)8,
12(2)10,
12(3)18,
12(4)20,
13(1)10,
13(4)29,
13(4)34,
14(3)25,
14(3)26,
14(3)27,
14(4)32,
15(1)2,
15(2)6,
16(4)14,
16(4)17,
17(2)8,
17(3)10,
17(3)12,
17(4)13,
18(1)4
- energy,
11(4)18,
11(4)23
- entities,
2(2)138,
10(1)2,
10(3)12,
11(1)2,
12(1)4,
12(2)8,
14(3)27
- environments,
4(4)407,
7(3)392,
11(1)2,
11(4)22,
12(3)15,
13(3)20,
13(3)25,
13(4)32,
13(4)37,
13(4)38,
15(2)9,
18(3)11
- establish,
9(4)391,
11(4)17,
11(4)19,
11(4)20,
15(2)6,
16(3)12
- et,
2(1)3,
2(1)34,
9(2)181,
9(4)461,
10(2)6,
10(4)5,
13(4)37,
14(3)27,
15(3)11,
16(3)10,
18(3)10
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)12,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)230,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(1)2,
11(2)2,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(3)11,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)14
- hence,
2(1)105,
2(4)390,
10(4)3,
14(1)9,
14(4)32
- hostile,
7(2)242,
11(4)20,
11(4)22,
15(2)9
- implement,
2(2)177,
9(4)461,
11(1)3,
11(3)16,
12(1)4,
12(2)13,
14(1)6,
14(1)10,
14(3)24,
14(4)31,
15(2)6,
16(2)6,
16(2)8,
16(3)10,
16(4)14,
17(2)6,
17(3)10
- important,
1(1)3,
1(1)66,
2(3)295,
10(2)8,
11(4)18,
11(4)20,
12(1)4,
13(3)26,
13(3)27,
13(4)36,
14(4)28,
15(3)12,
15(4)18,
16(1)4,
17(3)11
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(2)2,
11(4)20,
11(4)22,
12(2)12,
12(3)14,
12(3)19,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)5,
16(2)7,
16(4)17,
18(1)1,
18(1)4
- increasing,
12(3)18,
13(3)22,
14(4)30,
17(3)10
- integrity,
1(1)26,
1(1)93,
2(1)65,
2(1)105,
3(1)51,
10(2)8,
10(3)11,
12(1)6,
12(3)14,
13(1)4,
13(1)5,
13(3)25,
14(3)24,
17(2)6,
17(4)15,
18(2)5
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)13,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
14(4)29,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- manipulation,
1(1)93
- Mica2,
11(4)18,
11(4)23
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- moreover,
2(4)416,
10(2)8,
12(1)1,
14(1)5,
14(3)27,
16(3)12,
16(4)15,
17(3)9,
17(3)10,
18(3)11
- motes,
11(4)18,
11(4)22,
11(4)23
- node,
10(1)3,
10(4)1,
10(4)6,
11(2)3,
11(3)12,
11(3)13,
11(3)15,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(1)7,
14(3)27,
17(4)13
- number,
7(2)319,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(1)2,
11(2)5,
11(3)12,
11(3)15,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
15(4)15,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- one,
1(1)26,
1(1)93,
2(1)3,
2(1)65,
2(3)295,
9(4)461,
10(1)2,
10(2)5,
10(2)8,
10(3)12,
10(4)3,
11(2)6,
12(1)1,
12(1)5,
12(2)13,
12(3)14,
13(3)21,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)3,
14(1)5,
14(4)30,
14(4)32,
15(2)10,
15(3)11,
15(4)16,
15(4)18,
16(1)3,
16(1)4,
16(3)9,
16(4)14,
17(2)8,
17(4)13,
18(1)1,
18(3)11,
18(4)13
- pairwise,
8(1)41,
8(2)228,
11(4)23
- party, third-,
2(4)354,
11(1)2
- physical,
10(1)2,
10(4)3,
11(2)2,
11(3)12,
11(4)22,
14(2)16,
15(2)7,
17(4)13,
17(4)16
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- program,
2(1)65,
2(3)332,
12(1)1,
12(2)10,
12(2)11,
12(3)16,
12(3)19,
13(3)21,
14(3)24,
15(1)2,
15(2)10,
16(2)7,
17(1)2,
17(3)11,
18(1)4
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- reduce,
2(3)295,
7(2)319,
9(4)391,
11(4)17,
12(2)13,
12(3)17,
13(3)27,
13(4)40,
14(1)12,
15(3)12,
16(1)4,
16(3)10,
16(4)17,
18(4)12,
18(4)13
- requiring,
11(1)2,
11(3)16,
15(2)9,
17(4)13,
18(4)13
- resource,
2(3)332,
9(4)391,
10(4)4,
11(1)2,
11(1)3,
11(1)4,
11(2)2,
11(4)19,
11(4)20,
12(1)1,
12(1)6,
12(4)22,
13(3)20,
14(1)7,
14(1)10,
15(4)18,
17(1)2,
17(3)9,
18(2)6
- revocation,
6(3)404,
9(3)325,
9(4)461,
12(3)18,
14(4)29
- revoke,
9(4)461,
13(4)39,
14(4)29
- scheme,
7(2)206,
7(4)523,
8(2)228,
9(3)325,
9(4)461,
10(4)5,
11(2)4,
11(2)5,
11(3)15,
11(4)18,
11(4)22,
12(1)2,
12(1)3,
12(2)9,
12(3)15,
12(3)16,
12(3)18,
13(4)29,
13(4)31,
13(4)37,
13(4)41,
14(1)5,
15(2)9,
15(4)18,
17(2)6,
17(3)10,
17(4)14,
17(4)15
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
10(4)6,
11(2)4,
11(2)5,
11(3)13,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(2)5,
18(4)13
- sensor,
8(1)41,
8(2)228,
11(2)1,
11(3)12,
11(3)13,
11(4)18,
11(4)22,
11(4)23,
13(3)25,
17(2)5
- server,
1(1)66,
2(1)34,
2(3)230,
2(4)390,
10(4)4,
11(2)2,
11(2)5,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
14(4)29,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- severe,
13(1)10,
14(1)2,
14(1)7
- showing,
2(2)138,
13(3)27,
16(1)1,
17(3)9
- tampering,
10(4)4,
13(4)30
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
13(4)35,
14(3)27,
14(4)31,
15(1)5,
15(2)9,
15(2)10,
15(4)15,
15(4)16,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- third-party,
2(4)354,
11(1)2
- traffic,
2(3)269,
10(2)8,
11(2)2,
11(2)3,
12(2)13,
12(4)22,
15(2)6,
15(4)16,
17(1)4
- trusted,
2(2)138,
2(3)269,
8(2)153,
10(4)3,
11(2)6,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
14(4)29,
15(2)9,
16(2)5,
16(2)7,
16(4)15,
17(2)6,
18(2)8
- type,
10(1)2,
10(1)3,
10(3)11,
10(4)5,
11(2)1,
12(1)1,
12(3)15,
13(3)21,
13(3)25,
13(4)32,
15(2)7,
15(2)10,
16(1)4,
18(1)1,
18(3)9
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- usually,
16(4)16
- various,
10(1)3,
10(3)11,
10(4)2,
11(1)3,
11(2)3,
11(2)6,
11(3)15,
12(1)4,
13(4)35,
14(1)13,
14(4)28,
18(1)1,
18(2)5
- verification,
2(3)332,
3(1)51,
8(3)287,
10(2)5,
10(2)6,
10(2)7,
10(3)9,
10(3)11,
11(2)5,
12(1)3,
12(1)6,
14(1)5,
14(3)25,
14(4)32,
15(1)3,
15(2)9,
15(4)18,
16(2)8,
17(2)6,
18(2)6,
18(2)8,
18(3)11,
18(4)14
- verify,
2(3)332,
9(4)421,
11(2)5,
14(1)12,
15(1)3,
16(3)11,
17(2)6,
18(2)6,
18(3)11
- very,
1(1)3,
2(1)65,
2(3)269,
10(4)1,
11(2)5,
11(4)18,
13(3)22,
13(3)27,
14(1)2,
15(1)2,
15(3)12,
16(1)1,
16(3)11,
16(4)13,
17(3)10,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)12,
18(4)14
- wireless,
7(2)319,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(2)2,
11(3)12,
11(3)13,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5