{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:00:07Z","timestamp":1766066407133,"version":"3.40.4"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_16","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"198-203","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of Key Management Schemes in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Filip","family":"Jurne\u010dka","sequence":"first","affiliation":[]},{"given":"Martin","family":"Stehl\u00edk","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a01, pp. 524\u2013535 (2005)","DOI":"10.1109\/INFCOM.2005.1497920"},{"key":"16_CR2","first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41\u201347. ACM, New York (2002)"},{"key":"16_CR3","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: Key Management Schemes for WSNs (2014), https:\/\/sourceforge.net\/projects\/kmsfwsn\/ (accessed July 14, 2014)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: On node capturing attacker strategies. In: Security Protocols XXII. LNCS, Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-319-12400-1_29"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"K\u00f6pke, A., et al.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Simulation Tools and Techniques for Communications, Networks and Systems, Simutools 2008, pp. 71:1\u201371:8. Brussels, Belgium (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"16_CR6","unstructured":"Lai, B., et al.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop LARTES, p. 7 (2002)"},{"issue":"2","key":"16_CR7","first-page":"465","volume":"25","author":"S. \u00d6zdemir","year":"2012","unstructured":"\u00d6zdemir, S., Khalil, O.: Performance evaluation of key management schemes in wireless sensor networks. Gazi University Journal of Science\u00a025(2), 465\u2013476 (2012)","journal-title":"Gazi University Journal of Science"},{"key":"16_CR8","first-page":"789","volume-title":"Proceedings of the 2011 IEEE WAINA","author":"R. Roman","year":"2011","unstructured":"Roman, R., et al.: Sensekey \u2013 simplifying the selection of key management schemes for sensor networks. In: Proceedings of the 2011 IEEE WAINA, pp. 789\u2013794. IEEE Computer Society, Washington, DC (2011)"},{"issue":"15","key":"16_CR9","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1016\/j.comnet.2010.04.010","volume":"54","author":"M.J. Simpl\u00edcio","year":"2010","unstructured":"Simpl\u00edcio, M.J., et al.: A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks\u00a054(15), 2591\u20132612 (2010)","journal-title":"Computer Networks"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Vu, T.M., Williamson, C., Safavi-Naini, R.: Simulation modeling of secure wireless sensor networks. In: Proceedings of the 4thInternational ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2009, pp. 30:1\u201330:10. Brussels, Belgium (2009)","DOI":"10.4108\/ICST.VALUETOOLS2009.7629"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:17:31Z","timestamp":1746368251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}