{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:09Z","timestamp":1772196489016,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540229872","type":"print"},{"value":"9783540301080","type":"electronic"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30108-0_18","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T14:15:03Z","timestamp":1284646503000},"page":"293-308","source":"Crossref","is-referenced-by-count":101,"title":["Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Seyit A.","family":"\u00c7amtepe","sequence":"first","affiliation":[]},{"given":"B\u00fclent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Anderson, I.: Combinatorial Designs: Construction Methods. Ellis Horwood Limited (1990)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectlysecure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"18_CR4","unstructured":"Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. RPI Computer Science Department, Technical Report 04-10 (2004), \n                  \n                    www.cs.rpi.edu\/research\/tr.html"},{"key":"18_CR5","unstructured":"Carman, D.W., Matt, B.J., Cirincione, G.H.: Energy-efficient and Low-latency Key Management for Sensor Networks. In: Proceedings of 23rd Army Science Conference (2002)"},{"key":"18_CR6","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: 2003 IEEE Symposium on Research in Security and Privacy (2003)"},{"key":"18_CR7","unstructured":"Chen, M., Cui, W., Wen, V., Woo, A.: Security and Deployment Issues in a Sensor Network. Ninja Project, A Scalable Internet Services Architecture, Berkeley (2000), \n                  \n                    http:\/\/citeseer.nj.nec.com\/chen00security.html"},{"key":"18_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781420049954","volume-title":"The CRC Handbook of Combinatorial Designs","author":"C.J. Colbourn","year":"1996","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (1996)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS (2003)","DOI":"10.1145\/948109.948118"},{"key":"18_CR10","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM (2004)"},{"key":"18_CR11","unstructured":"Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks. Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado (2003)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/3-540-36978-3_23","volume-title":"Information Processing in Sensor Networks","author":"J. Deng","year":"2003","unstructured":"Deng, J., Han, R., Mishra, S.: A Performance Evaluation of Intrusion-Tolerant Routing inWireless Sensor Networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol.\u00a02634, pp. 349\u2013364. Springer, Heidelberg (2003)"},{"key":"18_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-62012-6","volume-title":"Finite Geometries","author":"P. Dembowski","year":"1968","unstructured":"Dembowski, P.: Finite Geometries. Springer, Heidelberg (1968)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)","DOI":"10.1145\/586110.586117"},{"key":"18_CR15","unstructured":"Hall, M.: Combinatorial Theory. Blaisdell Publishing Company (1967)"},{"key":"18_CR16","volume-title":"Projective Geometries Over Finite Fields","author":"J.W.P. Hirschfeld","year":"1979","unstructured":"Hirschfeld, J.W.P.: Projective Geometries Over Finite Fields. Clarendon Press, Oxford (1979)"},{"key":"18_CR17","unstructured":"Liu, D., Ning, P.: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. In: The 10th Annual Network and Distributed System Security Symposium (February 2003)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM conference on Computer and communication security (2003)","DOI":"10.1145\/948138.948141"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security (2003)","DOI":"10.1145\/948117.948119"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Merkle, R.: Secure Communication over insecure channels. Communications of the ACM (1978)","DOI":"10.1145\/359460.359473"},{"key":"18_CR21","unstructured":"Payne, S.E., Thas, J.A.: Finite Generalized Quadrangles. Research Notes in Mathematics. Pitman Advanced Publishing Program (1984)"},{"key":"18_CR22","unstructured":"Pedoe, D.: An introduction to Projective Geometry. Oxford (1963)"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, WINE (2002)","DOI":"10.1145\/381677.381696"},{"key":"18_CR24","unstructured":"Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication Security in Wireless Ad-Hoc Sensor Network. In: Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2002 (2002)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: AT&T software symposium (1999)","DOI":"10.1007\/10720107_24"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1007\/3-540-48184-2_28","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"D.R. Stinson","year":"1988","unstructured":"Stinson, D.R., Vanstone, S.A.: A combinatorial approach to threshold schemes. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 330\u2013339. Springer, Heidelberg (1988)"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-48184-2_31","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"D.R. Stinson","year":"1988","unstructured":"Stinson, D.R.: A construction for authentication \/ secrecy codes from certain combinatorial designs. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 355\u2013366. Springer, Heidelberg (1988)"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-46766-1_4","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D.R. Stinson","year":"1992","unstructured":"Stinson, D.R.: Combinatorial characterizations of authentication codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 62\u201373. Springer, Heidelberg (1992)"},{"issue":"3","key":"18_CR29","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S1389-1286(02)00395-X","volume":"3","author":"Y. Song","year":"2003","unstructured":"Song, Y., Wool, A., Yener, B.: Combinatorial Design of Multi-ring Networks with Combined Routing and Flow Control. Computer Networks\u00a03(3), 247\u2013267 (2003)","journal-title":"Computer Networks"},{"key":"18_CR30","unstructured":"Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for Sensor Networks. In: CADIP Research Symposium (2002)"},{"key":"18_CR31","volume-title":"Combinatorial Desing","author":"W.D. Wallis","year":"1988","unstructured":"Wallis, W.D.: Combinatorial Desing. Marcel Dekker Inc., New York (1988)"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Yener, B., Ofek, Y., Yung, M.: Combinatorial Design of Congestion Free Networks. In: IEEE\/ACM Transactions on Networking, vol. 5(6), December 1997, pp. 989\u20131000 (1997)","DOI":"10.1109\/90.650156"},{"key":"18_CR33","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: 11th IEEE International Conference on Network Protocols, ICNP 2003 (2003)"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security (2003)","DOI":"10.1145\/948109.948120"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30108-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:33:51Z","timestamp":1559507631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30108-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229872","9783540301080"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30108-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}