{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:47Z","timestamp":1725544607540},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540331087"},{"type":"electronic","value":"9783540331094"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11693383_13","type":"book-chapter","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T05:55:05Z","timestamp":1140846905000},"page":"189-204","source":"Crossref","is-referenced-by-count":2,"title":["Tree-Based Key Distribution Patterns"],"prefix":"10.1007","author":[{"given":"Jooyoung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"The Probabilistic Method","author":"N. Alon","year":"1992","unstructured":"Alon, N., Spencer, J.: The Probabilistic Method. Wiley, New York (1992)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-540-40061-5_24","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"N. Attrapadung","year":"2003","unstructured":"Attrapadung, N., Kobara, K., Imai, H.: Sequential key derivation patterns for broadcast encryption and key predistribution schemes. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 374\u2013391. Springer, Heidelberg (2003)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"13_CR5","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197\u2013213 (2003)"},{"volume-title":"The CRC Handbook of Combinatorial Designs","year":"1996","key":"13_CR6","unstructured":"Colbourn, C.J., Dinitz, J.H. (eds.): The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (1996)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/BF00191355","volume":"8","author":"M. Dyer","year":"1995","unstructured":"Dyer, M., Fenner, T., Frieze, A., Thomason, A.: On key storage in secure networks. Journal of Cryptology\u00a08, 189\u2013200 (1995)","journal-title":"Journal of Cryptology"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"13_CR9","unstructured":"Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: The IEEE Wireless Communications and Networking Conference, CD-ROM, 2005, paper PHY53-06, 6\u201311, \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/dstinson\/pubs.html"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-30564-4_21","volume-title":"Selected Areas in Cryptography","author":"J. Lee","year":"2004","unstructured":"Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 294\u2013307. Springer, Heidelberg (2004)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/3-540-48329-2_39","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"T. Leighton","year":"1994","unstructured":"Leighton, T., Micali, S.: Secret-key agreement without public-key cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 456\u2013479. Springer, Heidelberg (1994)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C.J. Mitchell","year":"1988","unstructured":"Mitchell, C.J., Piper, F.C.: Key storage in secure networks. Discrete Applied Mathematics\u00a021, 215\u2013228 (1988)","journal-title":"Discrete Applied Mathematics"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1014939630572","volume":"25","author":"C. Padr\u00f3","year":"2002","unstructured":"Padr\u00f3, C., Grasia, I., Mollev\u00ed, S.M., Morillo, P.: Linear key predistribution schemes. Designs, Codes and Cryptography\u00a025, 281\u2013298 (2002)","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR15","unstructured":"Ramkumar, M., Memon, N.: HARPS-Hashed Random Preloaded Subset Key Distribution. Cryptology ePrint Archive, Report 2003\/170 (2003), \n                    \n                      http:\/\/eprint.iacr.org\/2003\/170"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1008209004667","volume":"14","author":"D.R. Stinson","year":"1998","unstructured":"Stinson, D.R., van Trung, T.: Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography\u00a014, 261\u2013279 (1998)","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/S0012-365X(03)00287-5","volume":"279","author":"D.R. Stinson","year":"2004","unstructured":"Stinson, D.R., Wei, R.: Generalized cover-free families. Discrete Mathematics\u00a0279, 463\u2013477 (2004)","journal-title":"Discrete Mathematics"},{"key":"13_CR18","unstructured":"Wei, R.: On cover-free families. Discrete Mathematics (to appear)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11693383_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:50:42Z","timestamp":1619506242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11693383_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540331087","9783540331094"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11693383_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}