{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T05:43:01Z","timestamp":1736314981861,"version":"3.32.0"},"publisher-location":"New York","reference-count":13,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387291210"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-32015-6_25","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T01:26:06Z","timestamp":1140657966000},"page":"271-279","source":"Crossref","is-referenced-by-count":1,"title":["A Key-Exchanging Scheme for Distributed Sensor Networks"],"prefix":"10.1007","author":[{"given":"Hung Le","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Laurent Eschenauer and Virgil D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pages 41\u201347, November 2002.","DOI":"10.1145\/586110.586117"},{"key":"25_CR2","unstructured":"W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, \u201cA key management scheme for wireless sensor networks using deployment knowledge,\u201d IEEE INFOCOM, March 2004."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffle","year":"1976","unstructured":"W. Diffle and M.E. Hellman New direction in cryptograph. IEEE Transaction on Information Theory vol. 22 pp.644\u2013654. November 1976","journal-title":"IEEE Transaction on Information Theory"},{"issue":"8","key":"25_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"B.C. Neumab","year":"2002","unstructured":"B.C. Neumab sbd T. Tso. Kerberos: An authentication service for computer networks. IEEE communications Magazine. vol 40. no. 8. pp. 102\u2013114. August 2002","journal-title":"IEEE communications Magazine"},{"key":"25_CR5","unstructured":"H. Chan, A. Perrig and D. Song. A random key predistribution schemes for sensor networks. in IEEE Symposium on Security and Privacy. Berkeley, California, May 11\u201314 2003 pp. 197\u2013213"},{"key":"25_CR6","unstructured":"Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, May 2003."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In ACM CCS 2003, pages 42\u201351, October 2003.","DOI":"10.1145\/948109.948118"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Donggang Liu and Peng Ning. Establishing pairwise keys in distributed sensor networks. In ACM CCS 2003, pages 52\u201361, October 2003.","DOI":"10.1145\/948109.948119"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), July 2001.","DOI":"10.1145\/381677.381696"},{"key":"25_CR10","unstructured":"D. W. Carman, P. S. Kruus and B. J. Matt, \u201cConstraints and Approaches for Distributed Sensor Network Security,\u201d dated September 1, 2000. NAI Labs Technical Report #00-010, available at http:\/\/download.nai.com\/products\/media\/nai\/zip\/nailabs-report-00-010-final.zip"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag 2000, ISBN 3-540-41654-4.","DOI":"10.1007\/978-3-662-04538-1_1"},{"key":"25_CR12","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"F. Stajano","year":"2002","unstructured":"F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, New York, Feb. 12, 2002, ISBN: 0-470-84493-0, 267 pp.","ISBN":"https:\/\/id.crossref.org\/isbn\/0470844930"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Haowen Chan, A. Perrig, D. Song. Key Distribution Techniques for Sensor Networks. Springer-Verlag 2004, ISBN: 1-4020-7883-8. pp. 277\u2013303","DOI":"10.1007\/1-4020-7884-6_13"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Intelligence in Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-32015-6_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T21:14:30Z","timestamp":1736284470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-32015-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387291210"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-32015-6_25","relation":{},"subject":[]}}