{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:39:03Z","timestamp":1736573943144,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_19","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"257-269","source":"Crossref","is-referenced-by-count":9,"title":["Diverging Keys in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Ren","sequence":"first","affiliation":[]},{"given":"Tanmoy Kanti","family":"Das","sequence":"additional","affiliation":[]},{"family":"Jianying","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: Smart Trust for Smart Dust. In: Proceedings of IEEE International Conference on Network Protocols (ICNP 2004) (October 2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"19_CR2","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security. Technical Report 00\u2013010, NAI Labs, Cryptographic Technologies Group Trusted Information Systems, NAI Labs, The Security Research Division Network Associates, Inc. 3060 Washington Road (Rt. 97) Glenwood, MD 21738-9745 (2000)"},{"key":"19_CR3","unstructured":"Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In: The 24th Conference of the IEEE Communications Society (Infocom 2005) (March 2005)"},{"key":"19_CR4","first-page":"197","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 197\u2013213. IEEE Computer Society, Los Alamitos (2003)"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security\u00a08(2), 228\u2013258 (2005)","journal-title":"ACM Transactions on Information and System Security"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 41\u201347. ACM Press, New York (2002)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: The proceedings of INFOCOMM 2003 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1029102.1029110","volume-title":"Proceedings of the 2 nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004)","author":"D. Huang","year":"2004","unstructured":"Huang, D., Mehta, M., Medhi, D., Harn, L.: Locationaware Key Management Scheme for Wireless Sensor Networks. In: Proceedings of the 2 nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 29\u201342. ACM Press, New York (2004)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In: IEEE Conference on Security and Privacy (2005)","DOI":"10.1109\/SP.2005.7"},{"key":"19_CR10","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: IPSN 2004, Barkley, California, USA, pp. 259\u2013268 (April 26-27, 2004)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: IEEE S&P (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security Protocols for Sensor Netowrks. In: Mobile Computing and Networking, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Tiri, K., Hwang, D., Hodjat, A., Lai, B.C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-Based Cryptographic and Biometric Security Coprocessor IC in 0.18-um CMOS Resistant to Side-Channel Power Analysis Attacks. In: Proceedings of the Symposia on VLSI Technology and Circuits, pp. 216\u2013219 (June 2005)","DOI":"10.1109\/VLSIC.2005.1469370"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:58:53Z","timestamp":1736564333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11836810_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}