{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:15:35Z","timestamp":1725498935906},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540774433"},{"type":"electronic","value":"9783540774440"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77444-0_36","type":"book-chapter","created":{"date-parts":[[2007,12,19]],"date-time":"2007-12-19T08:57:09Z","timestamp":1198054629000},"page":"345-349","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Key Establishment Scheme for Self-organizing Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yong Ho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kyu Young","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Barr, K., Asanovic, K.: Energy aware lossless data compression. In: 1st Int. Conf. Mobile Syst., Applicat., Services, pp. 231\u2013244 (May 2003)","DOI":"10.1145\/1066116.1066123"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/11506157_41","volume-title":"Information Security and Privacy","author":"K.Y. Choi","year":"2005","unstructured":"Choi, K.Y., Hwang, J.Y., Lee, D.H.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 494\u2013505. Springer, Heidelberg (2005)"},{"key":"36_CR3","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report 00-010 (September 2000)"},{"key":"36_CR4","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197\u2013213 (May 2003)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS 2002, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"36_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-30496-8_2","volume-title":"Security in Ad-hoc and Sensor Networks","author":"G. Gaubatz","year":"2005","unstructured":"Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 2\u201318. Springer, Heidelberg (2005)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 2003, pp. 141\u2013150 (2003)","DOI":"10.1145\/941350.941371"},{"key":"36_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: ACM SASN 2004, pp. 59\u201364 (October 2004)","DOI":"10.1145\/1029102.1029113"},{"issue":"2","key":"36_CR10","first-page":"247","volume":"24","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks\u00a024(2), 247\u2013260 (2006)","journal-title":"IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks"},{"issue":"4","key":"36_CR11","first-page":"829","volume":"24","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Liu, W., Lou, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications\u00a024(4), 829\u2013835 (2006)","journal-title":"IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77444-0_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:12:32Z","timestamp":1619521952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77444-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774433","9783540774440"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77444-0_36","relation":{},"subject":[]}}