{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:28Z","timestamp":1725551608055},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_17","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"228-238","source":"Crossref","is-referenced-by-count":7,"title":["A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Dibyendu","family":"Chakrabarti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Subhamoy","family":"Maitra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bimal","family":"Roy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. Eurosics (2004)","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11556992_7","volume-title":"Information Security","author":"D. Chakrabarti","year":"2005","unstructured":"Chakrabarti, D., Maitra, S., Roy, B.: A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 89\u2013103. Springer, Heidelberg (2005)"},{"key":"17_CR4","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"17_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/9781420049954","volume-title":"The CRC Handbook of Combinatorial Designs","author":"C.J. Colbourn","year":"1996","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (1996)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/948109.948118","volume-title":"Proceedings of the 10th ACM conference on Computer and Communicatios Security","author":"W. Du","year":"2003","unstructured":"Du, W., Ding, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireles sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communicatios Security, pp. 42\u201351. ACM CCS, New York (2003)"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proceedings of the 9th ACM conference on Computer and Communicatios Security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.B.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communicatios Security, pp. 41\u201347. ACM CCS, New York (2002)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Kahn, J.M., Katz, R.H., Pister, K.S.J.: Next century challenges: Mobile networking for smart dust. In: Proceedings of the 5th annual ACM\/IEEE international conference on mobile computing and networking, pp. 483\u2013492 (1999)","DOI":"10.1145\/313451.313558"},{"key":"17_CR9","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"2002","unstructured":"Stinson, D.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall, CRC Press, Boca Raton (2002)","edition":"2"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-30564-4_21","volume-title":"Selected Areas in Cryptography","author":"J. Lee","year":"2004","unstructured":"Lee, J., Stinson, D.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 294\u2013307. Springer, Heidelberg (2004)"},{"key":"17_CR11","unstructured":"Lee, J., Stinson, D.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Computing and Networking Conference (WCNC 2005), New Orleans, LA, USA, March 13-17 (2005)"},{"key":"17_CR12","volume-title":"Combinatorics of experimental design","author":"A.P. Street","year":"1987","unstructured":"Street, A.P., Street, D.J.: Combinatorics of experimental design. Clarendon Press, Oxford (1987)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communicatios Security. ACM CCS, New York (2003)","DOI":"10.1145\/948109.948119"},{"key":"17_CR14","volume-title":"Combinatorial Designs: Constructions and Analysis","author":"D.R. Stinson","year":"2003","unstructured":"Stinson, D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:55Z","timestamp":1605643375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11593980_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}