{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:14:07Z","timestamp":1765887247891,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160226"},{"type":"electronic","value":"9783642160233"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16023-3_15","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T20:41:49Z","timestamp":1284928909000},"page":"159-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tuan Manh","family":"Vu","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Carey","family":"Williamson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,20]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1017\/S0305004100053056","volume":"80","author":"B. Bollob\u00e1s","year":"1976","unstructured":"Bollob\u00e1s, B., Erd\u0151s, P.: Cliques in Random Graphs. Mathematical Proceedings of the Cambridge Philosophical Society\u00a080(3), 419\u2013427 (1976)","journal-title":"Mathematical Proceedings of the Cambridge Philosophical Society"},{"key":"15_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of IEEE Security and Privacy Symposium, pp. 197\u2013213 (May 2003)"},{"issue":"6","key":"15_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key predistribution Scheme for Wireless Sensor Networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security, pp. 42\u201351 (October 2003)","DOI":"10.1145\/948109.948118"},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P. Erd\u0151s","year":"1959","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On Random Graphs. Publicationes Mathematicae\u00a06, 290\u2013297 (1959)","journal-title":"Publicationes Mathematicae"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1017\/S0305004100051124","volume":"77","author":"G. Grimmett","year":"1975","unstructured":"Grimmett, G., McDiarmid, C.: On Coloring Random Graphs. Mathematical Proceedings of the Cambridge Philosophical Society\u00a077, 313\u2013324 (1975)","journal-title":"Mathematical Proceedings of the Cambridge Philosophical Society"},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.adhoc.2006.01.003","volume":"5","author":"R. Gupta","year":"2007","unstructured":"Gupta, R., Musacchio, J., Walrand, J.: Sufficient rate constraints for QoS flows in ad-hoc networks. Ad-hoc Network\u00a05(4), 429\u2013443 (2007)","journal-title":"Ad-hoc Network"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1177\/104649647100200201","volume":"2","author":"P. Holland","year":"1971","unstructured":"Holland, P., Leinhardt, S.: Transitivity in Structural Models of Small Groups. Comparative Group Studies\u00a02, 107\u2013124 (1971)","journal-title":"Comparative Group Studies"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks, pp. 29\u201342 (October 2004)","DOI":"10.1145\/1029102.1029110"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Huang, X., Bensaou, B.: On Max-min Fairness and Scheduling in Wireless Ad Hoc Networks: Analytical Framework and Implementation. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 221\u2013231 (October 2001)","DOI":"10.1145\/501416.501447"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135\u2013147 (2003)","DOI":"10.1145\/986858.986877"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, Y.: Revisiting random key predistribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 43\u201352 (October 2004)","DOI":"10.1145\/1029102.1029111"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks, pp. 72\u201382 (October 2003)","DOI":"10.1145\/986858.986869"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Liu, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52\u201361 (October 2003)","DOI":"10.1145\/948109.948119"},{"key":"15_CR16","unstructured":"Massachusetts Institute of Technology, Kerberos: The Network Authentication Protocol, http:\/\/web.mit.edu\/kerberos\/"},{"issue":"3","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1341731.1341734","volume":"11","author":"R. Pietro","year":"2008","unstructured":"Pietro, R., Mancini, L., Mei, A., Panconesi, A., Radhakrishnan, J.: Redoubtable Sensor Networks. ACM Transactions on Information and System Security\u00a011(3), 1\u201322 (2008)","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Spencer, J.: The Strange Logic of Random Graphs. In: Algorithms and Combinatorics, vol.\u00a022. Springer, Heidelberg (2000), ISBN 3-540-41654-4","DOI":"10.1007\/978-3-662-04538-1_1"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Vu, T., Williamson, C., Safavi-Naini, R.: Simulation Modeling of Secure Wireless Sensor Networks. In: Proceedings of ValueTools 2009, Pisa, Italy (October 2009)","DOI":"10.4108\/ICST.VALUETOOLS2009.7629"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D. Watts","year":"1998","unstructured":"Watts, D., Strogatz, S.: Collective Dynamics of \u2018Small-world\u2019 Networks. Nature\u00a0393, 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"4","key":"15_CR21","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TMC.2006.1599404","volume":"5","author":"Y. Xue","year":"2006","unstructured":"Xue, Y., Li, B., Nahrstedt, K.: Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach. IEEE Transactions on Mobile Computing\u00a05(4), 347\u2013364 (2006)","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16023-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T11:34:24Z","timestamp":1685792064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-16023-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160226","9783642160233"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16023-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"20 September 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}