{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:06:04Z","timestamp":1743026764200,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540887324"},{"type":"electronic","value":"9783540887331"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88733-1_25","type":"book-chapter","created":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T02:08:02Z","timestamp":1224209282000},"page":"345-359","source":"Crossref","is-referenced-by-count":9,"title":["Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Wei","family":"Du","sequence":"first","affiliation":[]},{"given":"Mingxing","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Camtepe, S., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey. Technical Report, TR-05-07, Rensselaer Polytechnic Institute (2005)","key":"25_CR1","DOI":"10.1109\/ICC.2006.255107"},{"doi-asserted-by":"crossref","unstructured":"Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241\u2013257 (2002)","key":"25_CR2","DOI":"10.1109\/SECPRI.2002.1004375"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Sun, K.: Efficient Self-healing Group Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM conference on Computer and Communications Security, New York, pp. 2003\u2013231 (2003)","key":"25_CR3","DOI":"10.1145\/948109.948141"},{"doi-asserted-by":"crossref","unstructured":"More, S., Malkin, M., Staddon, J.: Sliding-window Self-healing Key Distribution with Revocation. In: ACM Workshop on Survivable and Self-regenerative Systems (2003)","key":"25_CR4","DOI":"10.1145\/1036921.1036930"},{"doi-asserted-by":"crossref","unstructured":"Blundo, C., Darco, P., Santis, A.D., Listo, M.: Design of Self-healing Key Distribution Schemes. Des. Codes Cryptography (2004)","key":"25_CR5","DOI":"10.1023\/B:DESI.0000029210.20690.3f"},{"doi-asserted-by":"crossref","unstructured":"Blundo, C.: Randomness in Self-Healing Key Distribution Schemes. Theory and Practice in Information-Theoretic Security, 80\u201384 (2005)","key":"25_CR6","DOI":"10.1109\/ITWTPI.2005.1543962"},{"doi-asserted-by":"crossref","unstructured":"Blundo, C., D\u2019Arco, P., Listo, M.: A Flaw in a Self-Healing Key Distribution Scheme. In: Proceedings of Information Theory Workshop, Paris, pp. 163\u2013166 (2003)","key":"25_CR7","DOI":"10.1109\/ITW.2003.1216720"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-540-27836-8_22","volume-title":"Fuzzy Sets and Systems Automata, Languages and Programming","author":"C. Blundo","year":"2004","unstructured":"Blundo, C., D\u2019Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Self-healing Key Distribution. In: D\u00edaz, J., Karhum\u00e4ki, J., Lepist\u00f6, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol.\u00a03142, pp. 234\u2013245. Springer, Heidelberg (2004)"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/LCOMM.2005.1496607","volume":"9","author":"D. Hong","year":"2005","unstructured":"Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Selfhealing Property. IEEE Communication Letters\u00a09, 759\u2013761 (2005)","journal-title":"IEEE Communication Letters"},{"doi-asserted-by":"crossref","unstructured":"Dutta, R., Wu, Y., Mukhopadhyay, S.: Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. In: IEEE International Conference on Communications, 2007, pp. 1323\u20131332 (2007)","key":"25_CR10","DOI":"10.1109\/ICC.2007.223"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of ACM"},{"doi-asserted-by":"crossref","unstructured":"Xukai, Z., Yuan-Shun, D.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: International Conference on Communication Technology, pp. 1\u20134 (2006)","key":"25_CR12","DOI":"10.1109\/ICCT.2006.341791"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-540-72738-5_25","volume-title":"Applied Cryptography and Network Security 2007","author":"R. Dutta","year":"2007","unstructured":"Dutta, R., Chang, E., Mukhopadhyay, S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Hash Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 385\u2013400. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Chadha, A., Yonghe, L., Das, S.K.: Group Key Distribution Via Local Collaboration in Wireless Sensor Networks. In: Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 46\u201354 (2005)","key":"25_CR14","DOI":"10.1109\/SAHCN.2005.1556863"},{"issue":"1","key":"25_CR15","first-page":"115","volume":"7","author":"T. Biming","year":"2008","unstructured":"Biming, T., Mingxing, H.: A Self-healing Key Distribution Scheme with Novel Properties. International Journal of Network Security\u00a07(1), 115\u2013120 (2008)","journal-title":"International Journal of Network Security"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88733-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T22:53:36Z","timestamp":1738450416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88733-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540887324","9783540887331"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88733-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}