{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:40:37Z","timestamp":1743018037929,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227196"},{"type":"electronic","value":"9783642227202"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22720-2_11","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:14:51Z","timestamp":1311596091000},"page":"111-121","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix"],"prefix":"10.1007","author":[{"given":"Manivannan","family":"Doraipandian","sequence":"first","affiliation":[]},{"given":"Ezhilarasie","family":"Rajapackiyam","sequence":"additional","affiliation":[]},{"given":"P.","family":"Neelamegam","sequence":"additional","affiliation":[]},{"given":"Anuj Kumar","family":"Rai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (2002)","DOI":"10.1145\/586110.586117"},{"key":"11_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symposium on Security and Privacy, pp. 197\u2013213, May 11-14 (2003)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor network. In: Proc. of the 10th ACM Conference on Computer and Communications (SecurityCCS 2003), pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"issue":"8","key":"11_CR6","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TPDS.2006.106","volume":"17","author":"M.F. Younis","year":"2006","unstructured":"Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems\u00a017(8), 865\u2013882 (2006)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"11_CR7","volume-title":"Cryptography and Network Security : Principles and Practices","author":"W. Stallings","year":"2005","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)","edition":"4"},{"key":"11_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-540-77018-3_60","volume-title":"Emerging Technologies in Knowledge Discovery and Data Mining","author":"M. Wen","year":"2007","unstructured":"Wen, M., Zheng, Y., Li, H., Chen, K.: A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol.\u00a04819, pp. 608\u2013620. Springer, Heidelberg (2007)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Dai, H., Xu, H.: Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE Sensors Journal (August 2010)","DOI":"10.1109\/JSEN.2009.2039130"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2717","volume":"146","author":"C. Blundo","year":"1998","unstructured":"Blundo, C., DeSantis, A., Herzberg, A., et al.: Perfectly-secure key distribution for dynamic conference. Inf. Comput.\u00a0146(1), 1\u201323 (1998)","journal-title":"Inf. Comput."},{"issue":"1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/B:JONS.0000015697.38671.ec","volume":"12","author":"M. Eltoweissy","year":"2004","unstructured":"Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management\u00a012(1), 33\u201350 (2004)","journal-title":"J. Network and Systems Management"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. RSA CryptoBytes\u00a05 (2002)","DOI":"10.1007\/978-1-4615-0229-6_3"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22720-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:11:42Z","timestamp":1558390302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22720-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227196","9783642227202"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22720-2_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}