{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:16Z","timestamp":1761611356040},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_5","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T10:57:06Z","timestamp":1400583426000},"page":"89-117","source":"Crossref","is-referenced-by-count":7,"title":["Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Henry","sequence":"first","affiliation":[]},{"given":"Maura B.","family":"Paterson","sequence":"additional","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10623-011-9590-1","volume":"67","author":"M Bose","year":"2013","unstructured":"Bose, M., Dey, A., Mukerjee, R.: Key predistribution schemes for distributed sensor networks via block designs. Des. Codes Crypt. 67(1), 111\u2013136 (2013)","journal-title":"Des. Codes Crypt."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"\u00c7amtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical Report TR-05-07, Rensselaer Polytechnic Institute (2005)","DOI":"10.1109\/ICC.2006.255107"},{"key":"5_CR3","series-title":"LNCS","first-page":"81","volume-title":"Inscrypt 2007","author":"J Dong","year":"2008","unstructured":"Dong, J., Pei, D., Wang, X.: A key predistribution scheme based on 3-designs. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 81\u201392. Springer, Heidelberg (2008)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM (2002)","DOI":"10.1145\/586115.586117"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330332.1330333","volume":"11","author":"J Lee","year":"2008","unstructured":"Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf.Syst. Secur. 11(2), 1\u201335 (2008). (Article No. 1)","journal-title":"ACM Trans. Inf. .Syst. Secur."},{"key":"5_CR6","series-title":"LNCS","first-page":"124","volume-title":"IWCC 2009","author":"KM Martin","year":"2009","unstructured":"Martin, K.M.: On the applicability of combinatorial designs to key predistribution for wireless sensor networks. In: Chee, Y.M., Li, Ch., Ling, S., Wang, H., Xing, Ch. (eds.) IWCC 2009. LNCS, vol. 5557, pp. 124\u2013145. Springer, Heidelberg (2009)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.entcs.2008.05.004","volume":"192","author":"KM Martin","year":"2008","unstructured":"Martin, K.M., Paterson, M.B.: An application-oriented framework for wireless sensor network key establishment. Electron. Notes Theor. Comput. Sci. 192(2), 31\u201341 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1824766.1824767","volume":"7","author":"KM Martin","year":"2010","unstructured":"Martin, K.M., Paterson, M.B., Stinson, D.R.: Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Trans. Sens. Netw. 7(2), 1\u201327 (2010). (Article No. 11)","journal-title":"ACM Trans. Sens. Netw."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10623-012-9749-4","volume":"71","author":"MB Paterson","year":"2014","unstructured":"Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Crypt. 71, 433\u2013457 (2014)","journal-title":"Des. Codes Crypt."},{"issue":"11\u201312","key":"5_CR10","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11\u201312), 2314\u20132341 (2007)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:47:14Z","timestamp":1558892834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}