{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:44:18Z","timestamp":1725515058068},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726944"},{"type":"electronic","value":"9783540726975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72697-5_20","type":"book-chapter","created":{"date-parts":[[2007,6,23]],"date-time":"2007-06-23T09:07:18Z","timestamp":1182589638000},"page":"235-246","source":"Crossref","is-referenced-by-count":0,"title":["ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tran Thanh","family":"Dai","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 185\u2013193. Springer, Heidelberg (1988)"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Info. Sys. Sec.\u00a08(2), 228\u2013258 (2005)","journal-title":"ACM Trans. Info. Sys. Sec."},{"issue":"11","key":"20_CR3","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, Nov. 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"20_CR5","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symposium on Security and Privacy, May 2003, pp. 197\u2013213 (2003)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS\u201903), Oct. 2003, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"20_CR7","unstructured":"Fu, H., Kawamura, S., Zhang, M., Zhang, L.: Replication attack on random key pre-distribution schemes for wireless sensor networks. In: Proc. IEEE on SMC Information Assurance Workshop, Jun. 2005, pp. 134\u2013141 (2005)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Moore, T.: A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In: Proc. IEEE on Pervasive Computing and Communications Workshops, PERCOMW\u201906 (Mar. 2006)","DOI":"10.1109\/PERCOMW.2006.3"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proc. of IEEE Symposium on Security and Privacy, May 2005, pp. 49\u201363 (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"20_CR10","unstructured":"Dai, T.T., Hieu, C.T., Rahman, M.M., Hong, C.S.: A Robust Pairwise Key Predistribution Scheme Resistant to Common Attacks for Wireless Sensor Networks. In: Proc. of 7th WISA, Jeju Island, Korea, Aug. 2006, pp. 121\u2013135 (2006)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11847366_27","volume-title":"High Performance Computing and Communications","author":"T.T. Dai","year":"2006","unstructured":"Dai, T.T., Hieu, C.T., Hong, C.S.: An Efficient ID-based Bilinear Key Predistribution Scheme for Distributed Sensor Networks. In: Gerndt, M., Kranzlm\u00fcller, D. (eds.) HPCC 2006. LNCS, vol.\u00a04208, pp. 260\u2013269. Springer, Heidelberg (2006)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"20_CR13","unstructured":"Chan, S.P., Poovendran, R., Sun, M.T.: A key management scheme in distributed sensor networks using attack probabilities. In: Proc. IEEE GLOBECOM 2005, pp. 1007\u20131011 (2005)"},{"key":"20_CR14","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1998","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall, Englewood Cliffs (Jul. 1998)","edition":"2"},{"key":"20_CR15","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72697-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:04:05Z","timestamp":1605744245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72697-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540726944","9783540726975"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72697-5_20","relation":{},"subject":[]}}