{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:18:30Z","timestamp":1761675510846},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747413"},{"type":"electronic","value":"9783540747420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74742-0_40","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T11:03:30Z","timestamp":1187694210000},"page":"431-445","source":"Crossref","is-referenced-by-count":33,"title":["Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Sushmita","family":"Ruj","sequence":"first","affiliation":[]},{"given":"Bimal","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-30108-0_18","volume-title":"Computer Security \u2013 ESORICS 2004","author":"S.A. Camtepe","year":"2004","unstructured":"Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"key":"40_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, California (2003)"},{"issue":"2","key":"40_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10207-006-0085-4","volume":"5","author":"D. Chakrabarti","year":"2006","unstructured":"Chakrabarti, D., Maitra, S., Roy, B.K.: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. International Journal of Information Security\u00a05(2), 105\u2013114 (2006)","journal-title":"International Journal of Information Security"},{"key":"40_CR4","unstructured":"Clatworthy, W.H.: Tables of Two-Associate-Class Partially Balanced Designs. NBS Applied Mathematics Series, vol.\u00a063 (1973)"},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proc. of the 9th ACM Conference on Computer and Communication Security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor network. In: Proc. of the 9th ACM Conference on Computer and Communication Security, Washington D.C, pp. 41\u201347. ACM Press, New York (2002)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"40_CR7","first-page":"52","volume-title":"Proc. of ACMCCS","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of ACMCCS, pp. 52\u201361. ACM Press, New York, USA (2003)"},{"key":"40_CR8","unstructured":"Lee, J., Stinson, D.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), New Orleans, LA, USA (2005)"},{"key":"40_CR9","volume-title":"Combinatorics of Experimental Design","author":"A.P. Street","year":"1987","unstructured":"Street, A.P., Street, D.J.: Combinatorics of Experimental Design. Clarendon Press, Oxford (1987)"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74742-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T19:23:53Z","timestamp":1548357833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74742-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747413","9783540747420"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74742-0_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}