{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:01Z","timestamp":1742913661458,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642255595"},{"type":"electronic","value":"9783642255601"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25560-1_20","type":"book-chapter","created":{"date-parts":[[2011,11,9]],"date-time":"2011-11-09T22:28:46Z","timestamp":1320877726000},"page":"294-308","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Prithu","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Mahasweta","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Ferdous A.","family":"Barbhuiya","sequence":"additional","affiliation":[]},{"given":"Sandip","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, E.W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: Survey. Journal of Computer Networks\u00a038(4), 393\u2013422 (2002)","journal-title":"Journal of Computer Networks"},{"issue":"8","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1109\/JPROC.2003.814918","volume":"91","author":"C.Y. Chong","year":"2003","unstructured":"Chong, C.Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE\u00a091(8), 1247\u20131256 (2003)","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11276-008-0146-x","volume":"16","author":"D. Koutsonikolas","year":"2010","unstructured":"Koutsonikolas, D., Das, S.M., Hu, Y.C., Stojmenovic, I.: Hierarchical Geographic Multicast Routing for Wireless Sensor Networks. Journal of Wireless Networks\u00a016(2), 449\u2013466 (2010)","journal-title":"Journal of Wireless Networks"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Sanchez, J.A., Ruiz, P.M., Stojmnenovic, I.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. In: The 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications, pp. 20\u201329 (October 2006)","DOI":"10.1109\/SAHCN.2006.288405"},{"issue":"3","key":"20_CR5","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TPDS.2007.70731","volume":"19","author":"S.M. Das","year":"2008","unstructured":"Das, S.M., Pucha, H., Hu, Y.C.: Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks. IEEE Transaction on Parallel and Distributed System\u00a019(3), 347\u2013362 (2008)","journal-title":"IEEE Transaction on Parallel and Distributed System"},{"issue":"6","key":"20_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communications of the ACM"},{"issue":"5","key":"20_CR7","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Journal of Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Journal of Wireless Networks"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)","DOI":"10.1145\/586110.586117"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ramamurthy, B.: Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks. In: The Proceeding of IEEE ICC, pp. 3419\u20133424 (2007)","DOI":"10.1109\/ICC.2007.566"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S.: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 397\u2013406 (October 2003)","DOI":"10.1109\/ICPPW.2003.1240395"},{"key":"20_CR11","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. Department of Computer Sciences, The Univ. of Texas at Austin, Tech. Rep. TR-97-23 (July 1997)"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M.G., Lam, S.S.: Secure Group Communication using Key Graphs. IEEE\/ACM Transaction on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Dondeti, L.R., Mukherjee, S., Samal, A.: A Dual Encryption Protocol for Scalable Secure Multicasting. In: Proceedings of IEEE International Symposium on Computers and Communications (1999)","DOI":"10.1109\/ISCC.1999.780748"},{"issue":"9","key":"20_CR14","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M. Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications\u00a017(9), 1614\u20131631 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Popek, G., Kline, C.: Encryption and Secure Computer Networks. ACM Computing Surveys, 331\u2013356 (December 1979)","DOI":"10.1145\/356789.356794"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25560-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T05:58:41Z","timestamp":1560923921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25560-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642255595","9783642255601"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25560-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}