{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:22:23Z","timestamp":1761675743427},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540243274"},{"type":"electronic","value":"9783540305644"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30564-4_21","type":"book-chapter","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T10:39:26Z","timestamp":1268044766000},"page":"294-307","source":"Crossref","is-referenced-by-count":94,"title":["Deterministic Key Predistribution Schemes for Distributed Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jooyoung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"21_CR2","unstructured":"Carmen, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security. NAI Labs Technical Report #00-010 (September 2000)"},{"key":"21_CR3","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197\u2013213 (2003)"},{"key":"21_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9781420049954","volume-title":"The CRC Handbook of Combinatorial Designs","author":"C.J. Colbourn","year":"1996","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (1996)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varsheney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS) (October 2003)","DOI":"10.1145\/948109.948118"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"21_CR7","volume-title":"Algorithmic Graph Theory","author":"A. Gibbons","year":"1985","unstructured":"Gibbons, A.: Algorithmic Graph Theory. Cambridge Univ. Press, Cambridge (1985)"},{"volume-title":"Handbook of Combinatorics","year":"1995","key":"21_CR8","unstructured":"Graham, R.L., Gr\u00f6tschel, M., Lov\u00e1sz, L. (eds.): Handbook of Combinatorics, vol.\u00a02. North-Holland, Amsterdam (1995)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS) (October 2003)","DOI":"10.1145\/948109.948119"},{"key":"21_CR10","volume-title":"Combinatorial Designs: Constructions and Analysis","author":"D.R. Stinson","year":"2003","unstructured":"Stinson, D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30564-4_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:22:33Z","timestamp":1605741753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30564-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540243274","9783540305644"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30564-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}