{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:43:35Z","timestamp":1725896615628},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368820"},{"type":"electronic","value":"9783642368837"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36883-7_5","type":"book-chapter","created":{"date-parts":[[2013,2,12]],"date-time":"2013-02-12T19:45:18Z","timestamp":1360698318000},"page":"61-75","source":"Crossref","is-referenced-by-count":3,"title":["Two Improvements of Random Key Predistribution for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ji\u0159\u00ed","family":"K\u016fr","sequence":"first","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","first-page":"41","volume-title":"9th ACM Conference on Computer and Communications Security, CCS 2002","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41\u201347. ACM, New York (2002)"},{"key":"5_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Symposium on Security and Privacy, pp. 197\u2013213. IEEE (2003)"},{"key":"5_CR3","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/1514274.1514306","volume-title":"2nd ACM Conference on Wireless Network Security","author":"P. \u0160venda","year":"2009","unstructured":"\u0160venda, P., Sekanina, L., Maty\u00e1\u0161, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: 2nd ACM Conference on Wireless Network Security, pp. 225\u2013236. ACM, New York (2009)"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1002\/wcm.397","volume":"6","author":"K. Ren","year":"2006","unstructured":"Ren, K., Zeng, K., Lou, W.: A new approach for random key pre-distribution in large-scale wireless sensor networks. Wireless Communications and Mobile Computing\u00a06(3), 307\u2013318 (2006)","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"S.A. Camtepe","year":"2007","unstructured":"Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Transactions on Networking\u00a015(2), 346\u2013358 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"11-12","key":"5_CR6","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y. Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications\u00a030(11-12), 2314\u20132341 (2007)","journal-title":"Computer Communications"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"Security Protocols","author":"R.L. Rivest","year":"1997","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Crispo, B. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 69\u201387. Springer, Heidelberg (1997)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/3-540-48329-2_39","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"T. Leighton","year":"1994","unstructured":"Leighton, T., Micali, S.: Secret-Key Agreement without Public-Key Cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 456\u2013479. Springer, Heidelberg (1994)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/986858.986868","volume-title":"1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SANS 2003)","author":"R. Pietro Di","year":"2003","unstructured":"Di Pietro, R., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SANS 2003), pp. 62\u201371. ACM, New York (2003)"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P.C. Oorschot van","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. Journal of Cryptology\u00a012(1), 1\u201328 (1999)","journal-title":"Journal of Cryptology"},{"key":"5_CR11","unstructured":"Anderson, D.P.: BOINC: A system for public-resource computing and storage. In: 5th IEEE\/ACM International Workshop on Grid Computing, pp. 4\u201310. IEEE Computer Society (2004)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36883-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T09:22:47Z","timestamp":1644312167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36883-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368820","9783642368837"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36883-7_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}