{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:06Z","timestamp":1746115866251,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642414275"},{"type":"electronic","value":"9783642414282"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41428-2_8","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T09:12:42Z","timestamp":1382433162000},"page":"92-105","source":"Crossref","is-referenced-by-count":0,"title":["Self-healing Schemes Suitable for Various WSNs"],"prefix":"10.1007","author":[{"given":"Atsuko","family":"Miyaji","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Spognardi, A.: Rok: A robust key pre-distribution protocol for multi-phase wireless sensor networks. In: SecureComm 2007, pp. 351\u2013360 (2007)","key":"8_CR2","DOI":"10.1109\/SECCOM.2007.4550354"},{"unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP 2003, pp. 197\u2013213 (2003)","key":"8_CR3"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10207-012-0162-9","volume":"11","author":"A.K. Da","year":"2012","unstructured":"Da, A.K.: A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Sec.\u00a011(3), 189\u2013211 (2012)","journal-title":"Int. J. Inf. Sec."},{"unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004, pp. 586\u2013597 (2004)","key":"8_CR5"},{"doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002, pp. 41\u201347 (2002)","key":"8_CR6","DOI":"10.1145\/586115.586117"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxq043","volume":"54","author":"M. Ergun","year":"2011","unstructured":"Ergun, M., Levi, A., Savas, E.: Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach. The Computer Journal\u00a054(4), 602\u2013616 (2011)","journal-title":"The Computer Journal"},{"doi-asserted-by":"crossref","unstructured":"Ito, H., Miyaji, A., Omote, K.: RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks. In: GLOBECOM 2010, pp. 1\u20135 (2010)","key":"8_CR8","DOI":"10.1109\/GLOCOM.2010.5683086"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-24550-3_20","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"T. Iida","year":"2011","unstructured":"Iida, T., Miyaji, A., Omote, K.: POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks. In: D\u00e9fago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol.\u00a06976, pp. 253\u2013267. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Kalkan, K., Yilmaz, S., Yilmaz, O.Z., Levi, A.: A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. In: Q2SWinet 2009, pp. 29\u201336 (2009)","key":"8_CR10","DOI":"10.1145\/1641944.1641951"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur.\u00a08(1), 41\u201377 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-89335-6_7","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"J. Palsberg","year":"2008","unstructured":"Palsberg, J., Tsudik, G.: DISH: Distributed self-healing. In: Kulkarni, S., Schiper, A. (eds.) SSS 2008. LNCS, vol.\u00a05340, pp. 47\u201362. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Miyaji, A., Omote, K.: How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs. In: AINA 2013, pp. 205\u2013212 (2013)","key":"8_CR13","DOI":"10.1109\/AINA.2013.68"},{"doi-asserted-by":"crossref","unstructured":"Pietro, R.D., Ma, D., Soriente, C., Tsudik, G.: POSH: Proactive co-operative self-healing in unattended wireless sensor networks. In: SRDS 2008, pp. 185\u2013194 (2008)","key":"8_CR14","DOI":"10.1109\/SRDS.2008.23"},{"unstructured":"Pietro, R.D., Oligeri, G., Soriente, C., Tsudik, G.: Intrusion-Resilience in Mobile Unattended WSNs. In: INFOCOM, pp. 2303\u20132311 (2010)","key":"8_CR15"},{"doi-asserted-by":"crossref","unstructured":"Tian, W., Han, S., Parvin, S., Dillon, T.S.: A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks. In: EUC 2010, pp. 617\u2013623 (2010)","key":"8_CR16","DOI":"10.1109\/EUC.2010.99"},{"doi-asserted-by":"crossref","unstructured":"Yilmaz, O.Z., Levi, A., Savas, E.: Multiphase deployment models for fast self healing in wireless sensor networks. In: SECRYPT 2008, pp. 136\u2013144 (2008)","key":"8_CR17","DOI":"10.5220\/0001924301360144"}],"container-title":["Lecture Notes in Computer Science","Internet and Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41428-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T17:48:44Z","timestamp":1746035324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41428-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414275","9783642414282"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41428-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}