{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:39Z","timestamp":1725533619924},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_70","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T10:22:04Z","timestamp":1245234124000},"page":"692-701","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ayesha","family":"Naureen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Attiya","family":"Akram","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rabia","family":"Riaz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ki-Hyung","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H. Farooq","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"70_CR1","doi-asserted-by":"crossref","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp.324\u2013328 (2005)","DOI":"10.1109\/PERCOM.2005.18"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: IEEE SECON (2004)","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Landstra, T., Zawodniok, M., Jagannathan, S.: Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks. In: 32nd IEEE Conference on Local Computer Networks, pp. 1009\u20131016 (2007)","DOI":"10.1109\/LCN.2007.135"},{"key":"70_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/11576259_50","volume-title":"Parallel and Distributed Processing and Applications - ISPA 2005 Workshops","author":"X. Cao","year":"2005","unstructured":"Cao, X., Huang, M., Chen, Y., Chen, G.: Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol.\u00a03759, pp. 454\u2013465. Springer, Heidelberg (2005)"},{"issue":"4","key":"70_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2006.1632659","volume":"44","author":"M. Eltoweissy","year":"2006","unstructured":"Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine\u00a044(4), 122\u2013130 (2006)","journal-title":"IEEE Communications Magazine"},{"issue":"6","key":"70_CR6","first-page":"53","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM, Special Issue on Wireless Sensor Networks\u00a047(6), 53\u201357 (2004)","journal-title":"Communications of the ACM, Special Issue on Wireless Sensor Networks"},{"key":"70_CR7","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"70_CR8","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM, pp. 586\u2013597 (2004)"},{"key":"70_CR9","doi-asserted-by":"crossref","unstructured":"Law, Y., Corin, R., Etalle, S., Hartel, P.: A formally verified decentralized key management for wireless sensor networks. Personal Wireless Communications (2003)","DOI":"10.1007\/978-3-540-39867-7_3"},{"key":"70_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D.: Spins: Security protocols for sensor networks. Wireless Networks (2002)","DOI":"10.1023\/A:1016598314198"},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security CCS (2003)","DOI":"10.1145\/948109.948120"},{"key":"70_CR12","unstructured":"Eltoweissy, M., et al.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Sys. Mgmt., Special Issue on Network Security, 332b (2004)"},{"key":"70_CR13","doi-asserted-by":"crossref","unstructured":"Younis, M., Ghumman, K., Eltoweissy, M.: Locationaware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems (2006)","DOI":"10.1109\/TPDS.2006.106"},{"key":"70_CR14","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems (2000)","DOI":"10.1109\/71.877936"},{"key":"70_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"70_CR16","unstructured":"Carman, D., Matt, B., Cirincione, G.: Energy-efficient and low-latency key management for sensor networks. In: 23rd Army Science Conference (2002)"},{"key":"70_CR17","series-title":"Lecture Notes in Computer Science","first-page":"368","volume-title":"Network and Parallel Computing","author":"R. Riaz","year":"2007","unstructured":"Riaz, R., Akbar, A.H., Hasan, M., Kim, K., Lhee, K., Naureen, A., Akram, A., Ahmed, H.F.: Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration. In: Li, K., Jesshope, C., Jin, H., Gaudiot, J.-L. (eds.) NPC 2007. LNCS, vol.\u00a04672, pp. 368\u2013373. Springer, Heidelberg (2007)"},{"key":"70_CR18","unstructured":"Crossbow Technology inc., \n                    \n                      http:\/\/www.xbow.com"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T17:10:13Z","timestamp":1552065013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}