{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:09:13Z","timestamp":1725890953426},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642169878"},{"type":"electronic","value":"9783642169885"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16988-5_9","type":"book-chapter","created":{"date-parts":[[2010,10,23]],"date-time":"2010-10-23T03:14:03Z","timestamp":1287803643000},"page":"92-104","source":"Crossref","is-referenced-by-count":1,"title":["From Key Predistribution to Key Redistribution"],"prefix":"10.1007","author":[{"given":"Jacek","family":"Cicho\u0144","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Go\u0142\u0119biewski","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","first-page":"41","volume-title":"ACM Conference on Computer and Communications Security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM, New York (2002)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30108-0_18","volume-title":"Computer Security \u2013 ESORICS 2004","author":"S.A. \u00c7amtepe","year":"2004","unstructured":"\u00c7amtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"key":"9_CR3","first-page":"197","volume-title":"IEEE Symposium on Security and Privacy","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Los Alamitos (2003)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004, pp. 206\u2013215 (2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1984","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1984)"},{"key":"9_CR6","unstructured":"Kulkarni, S., Bezawada, B., Gouda, M.G.: Optimal key distibution for secure communication. University of Texas atAustin MSU-CSE-07-189 (2007), \n                  \n                    http:\/\/www.cse.msu.edu\/publications\/tech\/TR\/MSU-CSE-07-189.ps"},{"key":"9_CR7","first-page":"11","volume-title":"WiSe 2005: Proceedings of the 4th ACM Workshop on Wireless Security","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Du, W.: Group-based key pre-distribution in wireless sensor networks. In: WiSe 2005: Proceedings of the 4th ACM Workshop on Wireless Security, pp. 11\u201320. ACM, New York (2005)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-05434-1_8","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"J. Cicho\u0144","year":"2009","unstructured":"Cicho\u0144, J., Grza\u0327\u015blewicz, J., Kuty\u0142owski, M.: Key levels and securing key predistribution against node captures. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol.\u00a05804, pp. 64\u201375. Springer, Heidelberg (2009)"},{"key":"9_CR9","volume-title":"Analytic Combinatorics","author":"P. Flajolet","year":"2008","unstructured":"Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 1st edn. Cambridge University Press, Cambridge (2008)","edition":"1"},{"key":"9_CR10","volume-title":"Analysis of algorithms: computational methods and mathematical tools","author":"M. Hofri","year":"1995","unstructured":"Hofri, M.: Analysis of algorithms: computational methods and mathematical tools. Oxford University Press, Oxford (1995)"}],"container-title":["Lecture Notes in Computer Science","Algorithms for Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16988-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T15:54:47Z","timestamp":1553183687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16988-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642169878","9783642169885"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16988-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}