{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:15:06Z","timestamp":1725470106665},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_29","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T20:50:18Z","timestamp":1157748618000},"page":"280-289","source":"Crossref","is-referenced-by-count":0,"title":["Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network"],"prefix":"10.1007","author":[{"given":"Inshil","family":"Doh","sequence":"first","affiliation":[]},{"given":"Jung-Min","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, Technical report, NAI Labs (2000)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM CCS 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"29_CR4","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key predistribution scheme for wireless sensor networks. In: Proc. of 10th ACM CCS 2003 (2003)","DOI":"10.1145\/948109.948118"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of 10th ACM CCS 2003, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"29_CR8","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of IEEE INFOCOM (2004)"},{"key":"29_CR9","unstructured":"Yu, Z., Guan, Y.: A Robust Group-based Key Management Scheme for Wireless Sensor Networks. IEEE Communications Society, WCNC (2005)"},{"key":"29_CR10","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy (2004)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:42:13Z","timestamp":1605642133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11847366_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}