{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:24Z","timestamp":1725551604691},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_15","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T02:40:20Z","timestamp":1130985620000},"page":"205-216","source":"Crossref","is-referenced-by-count":3,"title":["A Key Reshuffling Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"E. Gamal","year":"1985","unstructured":"Gamal, E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR4","volume-title":"Modern Cryptology","author":"G. Brassard","year":"1988","unstructured":"Brassard, G.: Modern Cryptology. Springer, New York (1988)"},{"key":"15_CR5","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stallings","year":"2002","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice-Hall, Englewood Cliffs (2002)","edition":"3"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Schaefer, E.: A simplified data encryption standard algorithm. In: Cryptologia (1996)","DOI":"10.1080\/0161-119691884799"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Merkle, R., Hellman, M.: On the security of multiple encryption. Communications of the ACM (1981)","DOI":"10.1145\/358699.358718"},{"key":"15_CR8","unstructured":"Rivest, R.: The rc5 algorithm. Dr. Dobb\u2019s Journal (1995)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Eschenaur, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"15_CR11","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution for sensor networks. In: IEEE Symposium on Security and Privacy, Berkely, California, pp. 197\u2013213 (2003)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Conference on Computer and Communications Security (CCS 2003), Washington DC, USA, pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"15_CR13","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: 23rd Conference of the IEEE Communications Society (Infocom 2004), Hong Kong, China (2004)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. In: Proceedings of the 7th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Erdos, P., Renyi, A.: On random graphs. Publ. Math., 290\u2013297 (1959)","DOI":"10.5486\/PMD.1959.6.3-4.12"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T04:01:29Z","timestamp":1683259289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11593980_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}