{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:49:01Z","timestamp":1769860141246,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642310195","type":"print"},{"value":"9783642310201","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31020-1_41","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T12:59:14Z","timestamp":1339505954000},"page":"351-359","source":"Crossref","is-referenced-by-count":11,"title":["An Improved ID-Based Key Management Scheme in Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Kakali","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Asok","family":"De","sequence":"additional","affiliation":[]},{"given":"Daya","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, USA (2002)","DOI":"10.1145\/586110.586117"},{"key":"41_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proceedings of the IEEE Security and Privacy Symposium (2003)"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Location based pairwise key distribution schemes for sensor networks. In: IEEE Computer Society Symposium on Security and Privacy, pp. 197\u2013213. IEEE (2003)","DOI":"10.1145\/986858.986869"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003, pp. 62\u201372 (2003)","DOI":"10.1145\/948109.948120"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Yang, K., Zheng, K., Yang, Y., Guo, S.: Pairing-based Key Management Scheme for Heterogeneous Sensor Networks. In: WICOM, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/WICOM.2010.5601402"},{"key":"41_CR6","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: An efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks. In: SPEED 2007 (2007), \n                    \n                      www.crypto.rub.de"},{"key":"41_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004), \n                    \n                      http:\/\/www.research.sun.com\/projects\/crypto"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A Secure Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. In: Sensors 2011, pp. 4767\u20134779 (2011)","DOI":"10.3390\/s110504767"},{"issue":"1","key":"41_CR9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.5626\/JCSE.2010.4.1.023","volume":"4","author":"S.M.K. Raazi","year":"2010","unstructured":"Raazi, S.M.K., Lee, S.: A Survey on Key Management Strategies for Different Application of Wireless Sensor Networks. Journal of Computing Science and Engineering\u00a04(1), 23\u201351 (2010)","journal-title":"Journal of Computing Science and Engineering"},{"key":"41_CR10","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, ISBN 0-387-95273-X"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Deng, J., Jiang, C.: ID-based key Management Strategies of Clustering Wireless Sensor Networks. IEEE (2009)","DOI":"10.1109\/WICOM.2009.5302563"},{"key":"41_CR12","unstructured":"Boujelben, M., Chiekhrouhou, O., Abid, M., Youssef, H.: A pairing Identity based Key Management Protocol for Heterogeneous Wireless Sensor Networks. In: N2S 2009. IEEE (2009)"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-10628-6_17","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"C.P.L. Gouv\u00eaa","year":"2009","unstructured":"Gouv\u00eaa, C.P.L., L\u00f3pez, J.: Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol.\u00a05922, pp. 248\u2013262. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31020-1_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:40:44Z","timestamp":1620114044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31020-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310195","9783642310201"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31020-1_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}