{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:53:31Z","timestamp":1725490411951},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_99","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"1107-1120","source":"Crossref","is-referenced-by-count":2,"title":["N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jong-Myoung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Young-Ju","family":"Han","sequence":"additional","affiliation":[]},{"given":"Seon-Ho","family":"Park","sequence":"additional","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proc. 9th ACM Conf. Comp. and Commun. Sec.","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: Proc. 9th ACM Conf. Comp. and Commun. Sec., pp. 41\u201347. ACM Press, New York (2002)"},{"key":"99_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"CCS \u201903: Proceedings of the 10th ACM conference on Computer and communications security","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS \u201903: Proceedings of the 10th ACM conference on Computer and communications security, pp. 52\u201361. ACM Press, New York (2003)"},{"key":"99_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., Santis, A.D., Herzberg, A., et al.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"99_CR4","first-page":"197","volume-title":"Proc. IEEE Sec. and Privacy Symp.","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. IEEE Sec. and Privacy Symp., pp. 197\u2013213. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"99_CR5","doi-asserted-by":"crossref","unstructured":"Cerpa, A., Elson, J., Estrin, D., Girod, L., Hamilton, M., Zhao, J.: Habitat Monitoring: Application Driver for Wireless Communications Technology. In: Proceedings of the ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean, San Jose, Costa Rica (2001)","DOI":"10.1145\/371626.371720"},{"key":"99_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks\u00a038, 393\u2013422 (2002)","journal-title":"Computer Networks"},{"issue":"5","key":"99_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/332833.332838","volume":"43","author":"G.J. Pottie","year":"2000","unstructured":"Pottie, G.J., Kaiser, W.J.: Embedding the Internet: Wireless Integrated Network Sensors. Communications of the ACM\u00a043(5), 51\u201358 (2000)","journal-title":"Communications of the ACM"},{"issue":"1","key":"99_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D Wood","year":"2002","unstructured":"Wood, A.D, Stankovic, J.A.: Denial of Service in Sensor Networks. Computer\u00a035(1), 54\u201362 (2002)","journal-title":"Computer"},{"key":"99_CR9","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Security, NAI Labs Technical Report, ##00-010 (2000)"},{"key":"99_CR10","doi-asserted-by":"crossref","unstructured":"Camtepe, S.A., Yener, B.: Key distribution Mechanisms for Wireless Sensor Networks: A Survey, Technical Report TR-05-07, Rensselaer Polytechnic Institute (March 2005)","DOI":"10.1109\/ICC.2006.255107"},{"key":"99_CR11","first-page":"11","volume-title":"Proc. 2005 ACM Wksp. Wireless Security (WiSe 2005)","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Du, W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. 2005 ACM Wksp. Wireless Security (WiSe 2005), pp. 11\u201320. ACM Press, New York (2005)"},{"key":"99_CR12","first-page":"11","volume-title":"Proc. 2005 ACM Wksp. Wireless Security (WiSe 2005)","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Du, W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. 2005 ACM Wksp. Wireless Security (WiSe 2005), pp. 11\u201320. ACM Press, New York (2005)"},{"key":"99_CR13","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM2004, vol.\u00a01, pp. 7\u201311 (2004)"},{"key":"99_CR14","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/PERCOM.2005.18","volume-title":"Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference","author":"A.S. Wander","year":"2005","unstructured":"Wander, A.S., Gura, N., Eberie, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference, pp. 324\u2013328. IEEE Computer Society Press, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_99.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:22:34Z","timestamp":1605763354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_99","relation":{},"subject":[]}}