{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:42:41Z","timestamp":1725550961856},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_26","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:23:41Z","timestamp":1270049021000},"page":"291-304","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN"],"prefix":"10.1007","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pu","family":"Tu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials\u00a08(2) (2006)","key":"26_CR1","DOI":"10.1109\/COMST.2006.315852"},{"issue":"5","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1360\/jos181218","volume":"18","author":"Z. Su","year":"2007","unstructured":"Su, Z., Lin, C., Feng, F.-J., Ren, F.-Y.: Key Management Schemes and Protocols for Wireless Sensor Networks. Journal of Software\u00a018(5), 1218\u20131231 (2007)","journal-title":"Journal of Software"},{"unstructured":"Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proceedings of Symposium on Research in Security and Privacy, Oakland, USA, pp. 197\u2013213 (2003)","key":"26_CR3"},{"issue":"6","key":"26_CR4","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1002\/wcm.397","volume":"3","author":"K. Ren","year":"2006","unstructured":"Ren, K., Zeng, K., Lou, W.: A new approach for random key pre-distribution in large-scale wireless sensor networks. Journal of Wireless Communication and Mobile Computing (Special Issue on wireless Networks Security)\u00a03(6), 307\u2013318 (2006)","journal-title":"Journal of Wireless Communication and Mobile Computing (Special Issue on wireless Networks Security)"},{"doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 42\u201351 (2003)","key":"26_CR5","DOI":"10.1145\/948109.948118"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 52\u201361 (2003)","key":"26_CR6","DOI":"10.1145\/948109.948119"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of SASN 2003, Fairfax, USA, pp. 72\u201382 (2003)","key":"26_CR7","DOI":"10.1145\/986858.986869"},{"unstructured":"Du, W., Deng, J., Han, Y.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM 2004, Hong Kong, China, pp. 586\u2013597 (2004)","key":"26_CR8"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proc. CCS 2002","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. CCS 2002, pp. 41\u201347. ACM Press, New York (2002)"},{"key":"26_CR10","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1017\/CBO9780511814068.009","volume-title":"Rand Graphs","author":"B. Bollobas","year":"2001","unstructured":"Bollobas, B., Fulton, W., Katok, A., et al.: Rand Graphs, 2nd edn., pp. 160\u2013200. Cambridge University Press, Cambridge (2001)","edition":"2"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Ramamurthy, B., Xue, Y.: A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations. In: IEEE International Conference on In Communications, ICC 2008, pp. 1625\u20131629 (2008)","key":"26_CR13","DOI":"10.1109\/ICC.2008.314"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Ramamurthy, B., Zou, X.: KeyRev: An efficient key revocation scheme for wireless sensor networks. In: Proc. ICC 2007, Glasgow, Scotland, UK (June 2007)","key":"26_CR14","DOI":"10.1109\/ICC.2007.213"},{"doi-asserted-by":"crossref","unstructured":"Traynor, P., Choi, H., Cao, G., Zhu, S., Porta, T.L.: Establishing pairwise keys in heterogeneous sensor networks. In: Proc. INFOCOM 2006 (2006)","key":"26_CR15","DOI":"10.1109\/INFOCOM.2006.260"},{"unstructured":"Ma, C.-g., Shang, Z.-g., Wang, H.-q.: Domain-based key management for heterogeneous wireless sensor networks. Journal on Communications\u00a00l.30(5) (2009)","key":"26_CR16"},{"doi-asserted-by":"crossref","unstructured":"Chan, A.C.-F.: Distributed symmetric key management for mobile Ad Hoc networks. In: Proceedings of the INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a04, pp. 2414\u20132424 (2004)","key":"26_CR17","DOI":"10.1109\/INFCOM.2004.1354663"},{"unstructured":"Liu, Z.-H., Ma, J.-F., Huang, Q.-P.: Domain-Based Key Management for Wireless Sensor Networks. Chinese Journal of Computers\u00a029(9) (September 2006)","key":"26_CR18"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:50:30Z","timestamp":1606168230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}