{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:14:42Z","timestamp":1725470082631},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_27","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T20:50:18Z","timestamp":1157748618000},"page":"260-269","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient ID-Based Bilinear Key Predistribution Scheme for Distributed Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tran Thanh","family":"Dai","sequence":"first","affiliation":[]},{"given":"Cao Trong","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology - CRYPTO 1987","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 185\u2013193. Springer, Heidelberg (1988)"},{"key":"27_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1998","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1998)"},{"key":"27_CR3","volume-title":"Internet Security: Cryptographic Principles, Algorithms, and Protocols","author":"M.Y. Rhee","year":"2003","unstructured":"Rhee, M.Y.: Internet Security: Cryptographic Principles, Algorithms, and Protocols. Wiley, Chichester (2003)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: CCS 2003, Washington, DC, USA (October 2003)","DOI":"10.1145\/948109.948120"},{"issue":"10","key":"27_CR5","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (May 2003)","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transactions on Mobile Computing\u00a05(2) (February 2006)","DOI":"10.1109\/TMC.2006.16"},{"key":"27_CR8","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings 2003 IEEE Symposium on Security and Privacy, pp. 197\u2013213 (May 2003)"},{"issue":"2","key":"27_CR9","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security\u00a08(2), 228\u2013258 (2005)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security\u00a08(1), 41\u201377 (2005)","journal-title":"ACM Transactions on Information and System Security"},{"key":"27_CR11","unstructured":"Bla\u00df, E.-O., Zitterbart, M.: Towards Acceptable Public-Key Encryption in Sensor Networks. In: Proceedings of the 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS (May 2005)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, pp. 324\u2013328 (March 2005)","DOI":"10.1109\/PERCOM.2005.18"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO 1992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Hanaoka, G., Nishioka, T., Zheng, Y., Imai, H.: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. The Computer Journal\u00a045(3) (2002)","DOI":"10.1093\/comjnl\/45.3.293"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networks (July 2001)","DOI":"10.1145\/381677.381696"},{"key":"27_CR16","unstructured":"Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp. 263\u2013276 (February 2003)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"27_CR19","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004, Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a01 (March 2004)"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Du, W., Ding, J., Han, Y., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the ACM Conference on Computer and Communication Security (CCS 2003), Washington, D.C. (October 2003)","DOI":"10.1145\/948109.948118"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 62\u201372 (October 2003)","DOI":"10.1145\/948109.948120"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:42:13Z","timestamp":1605642133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11847366_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}