{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:17:22Z","timestamp":1740097042881,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_2","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T07:41:36Z","timestamp":1409125296000},"page":"10-19","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"2_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A Survey. Computer Networks\u00a038(4), 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ben-Or, M.: Probabilistic algorithms in finite fields. In: Proceedings of 22nd Annual Symposium on Foundations of Computer Science (IEEE FOCS 1981), pp. 394\u2013398 (1981)","DOI":"10.1109\/SFCS.1981.37"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., Das, A.K., Sing, J.K.: A secure and effective access control scheme for distributed wireless sensor networks. International Journal of Communication Networks and Distributed Systems (in press, 2014)","DOI":"10.1504\/IJCNDS.2015.066003"},{"issue":"1","key":"2_CR4","first-page":"33","volume":"8","author":"S. Chatterjee","year":"2013","unstructured":"Chatterjee, S., Das, A.K., Sing, J.K.: Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey. Journal of Information Assurance and Security\u00a08(1), 33\u201357 (2013)","journal-title":"Journal of Information Assurance and Security"},{"issue":"1-2","key":"2_CR5","first-page":"121","volume":"21","author":"S. Chatterjee","year":"2014","unstructured":"Chatterjee, S., Das, A.K., Sing, J.K.: An enhanced access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks\u00a021(1-2), 121\u2013149 (2014)","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"2_CR6","unstructured":"Das, A.K.: Design and Analysis of Key Distribution Mechanisms in Wireless Sensor Networks. PhD thesis, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India (June 2008)"},{"issue":"5","key":"2_CR7","first-page":"526","volume":"5","author":"A.K. Das","year":"2010","unstructured":"Das, A.K.: A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks. Journal of Information Assurance and Security\u00a05(5), 526\u2013553 (2010)","journal-title":"Journal of Information Assurance and Security"},{"issue":"05","key":"2_CR8","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1142\/S0129054113500214","volume":"24","author":"A.K. Das","year":"2013","unstructured":"Das, A.K., Chatterjee, S., Sing, J.K.: A novel efficient access control scheme for large-scale distributed wireless sensor networks. International Journal of Foundations of Computer Science\u00a024(05), 625\u2013653 (2013)","journal-title":"International Journal of Foundations of Computer Science"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"A.K. Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., Tripathy, L.: Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences\u00a0209, 80\u201392 (2012)","journal-title":"Information Sciences"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X. Du","year":"2008","unstructured":"Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wireless Communications\u00a015(4), 60\u201366 (2008)","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"2_CR11","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.csi.2008.05.014","volume":"31","author":"H.F. Huang","year":"2009","unstructured":"Huang, H.F.: A novel access control protocol for secure sensor networks. Computer Standards & Interfaces\u00a031(2), 272\u2013276 (2009)","journal-title":"Computer Standards & Interfaces"},{"issue":"7","key":"2_CR12","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y. Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers\u00a053(7), 905\u2013921 (2004)","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"2_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communications of the ACM"},{"issue":"3","key":"2_CR14","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10776-009-0102-4","volume":"16","author":"A. Sorniotti","year":"2009","unstructured":"Sorniotti, A., Molva, R., Gomez, L., Trefois, C., Laube, A., Scaglioso, P.: Efficient access control for wireless sensor data. International Journal of Wireless Information Networks\u00a016(3), 165\u2013174 (2009)","journal-title":"International Journal of Wireless Information Networks"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.tele.2012.03.011","volume":"30","author":"F. Wu","year":"2013","unstructured":"Wu, F., Pai, H.T., Zhu, X., Hsueh, P.Y., Hu, Y.H.: An adaptable and scalable group access control scheme for managing wireless sensor networks. Telematics and Informatics\u00a030, 144\u2013157 (2013), \n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.tele.2012.03.011","journal-title":"Telematics and Informatics"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:00:38Z","timestamp":1558393238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}