{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:10:28Z","timestamp":1737580228232,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_22","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"333-348","source":"Crossref","is-referenced-by-count":4,"title":["MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks"],"prefix":"10.1007","author":[{"given":"Syed Muhammad Khaliq-ur-Rahman","family":"Raazi","sequence":"first","affiliation":[]},{"given":"Adil Mehmood","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Faraz Idris","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sung Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young Jae","family":"Song","sequence":"additional","affiliation":[]},{"given":"Young Koo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"22_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless Sensor Networks: A Survey, Computer Networks 38(4), 393\u2013422 (2002).","journal-title":"Computer Networks"},{"issue":"2","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/565702.565703","volume":"6","author":"S. Tilak","year":"2002","unstructured":"S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman, A Taxonomy of Wireless Microsensor Network Models, ACM Mobile Computing and Comm. Rev. 6(2), 1\u20138 (2002).","journal-title":"ACM Mobile Computing and Comm. Rev."},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/B:JONS.0000015697.38671.ec","volume":"12","author":"M. Eltoweissy","year":"2004","unstructured":"M. Eltoweissy, H. Heydari, L. Morales, and H. Sadborough, Combinatorial Optimization of Group Key Management, J. Network and Systems Management 12(1), 33\u201350 (2004).","journal-title":"J. Network and Systems Management"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"G. Dini and I.M. Savino, An Efficient Key Revocation Protocol for Wireless Sensor Networks, International Workshop on Wireless Mobile Multimedia, Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, 450\u2013452 (2006).","DOI":"10.1109\/WOWMOM.2006.23"},{"issue":"11","key":"22_CR5","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport, Password authentication with insecure communication, Communications of the ACM 24(11), 770\u2013772 (1981).","journal-title":"Communications of the ACM"},{"issue":"8","key":"22_CR6","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TPDS.2006.106","volume":"17","author":"M. Younis","year":"2006","unstructured":"M. Younis, K. Ghumman, and M. Eltoweissy, Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Trans. Parallel and Distrib. Sys. 17(8), 865\u2013882 (2006).","journal-title":"IEEE Trans. Parallel and Distrib. Sys."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"G. Gupta and M. Younis, Load-Balanced Clustering of Wireless Sensor Networks, Proc. Int\u2019l Conf. Comm. (ICC\u2019 03), 1848\u20131852 (2003).","DOI":"10.1109\/ICC.2003.1203919"},{"issue":"4","key":"22_CR8","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O. Younis","year":"2004","unstructured":"O. Younis and S. Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks, IEEE Trans. Mobile Computing 3(4), 366\u2013379 (2004).","journal-title":"IEEE Trans. Mobile Computing"},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/S1389-1286(03)00356-6","volume":"43","author":"K. Langendoen","year":"2003","unstructured":"K. Langendoen and N. Reijers, Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison, Computer Networks 43(4), 499\u2013518 (2003).","journal-title":"Computer Networks"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"A. Youssef, A. Agrawala, and M. Younis, Accurate Anchor-Free Localization in Wireless Sensor Networks, Proc. First IEEE Workshop Information Assurance in Wireless Sensor Networks (WSNIA\u2019 05), (2005).","DOI":"10.1109\/PCCC.2005.1460614"},{"issue":"2","key":"22_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM 21(2), 120\u2013126 (1978).","journal-title":"Comm. of the ACM"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"A.J. Menezes, P.C.V. Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, (1996).","DOI":"10.1201\/9781439821916"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"D. Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA-1), RFC 3174, IETF, (2001).","DOI":"10.17487\/rfc3174"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 Message-Digest Algorithm, RFC 1320, MIT and RSA Data Security Inc., (1992).","DOI":"10.17487\/rfc1321"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T20:37:56Z","timestamp":1737578276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_22","relation":{},"subject":[]}}