{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T01:56:01Z","timestamp":1750989361187,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:00:00Z","timestamp":1580428800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:00:00Z","timestamp":1580428800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["11971004","11571094"],"award-info":[{"award-number":["11971004","11571094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11277-020-07133-4","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T09:04:05Z","timestamp":1580461445000},"page":"1919-1945","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Key Predistribution Schemes Based on Orthogonal Arrays with Unique Hamming Distance Distribution"],"prefix":"10.1007","volume":"112","author":[{"given":"Shanqi","family":"Pang","sequence":"first","affiliation":[]},{"given":"Yongmei","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8130-5521","authenticated-orcid":false,"given":"Qiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Xianchao","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,31]]},"reference":[{"key":"7133_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1478-6","volume-title":"Orthogonal arrays: Theory and applications","author":"AS Hedayat","year":"1999","unstructured":"Hedayat, A. S., Sloane, N. J. A., & Stufken, J. (1999). Orthogonal arrays: Theory and applications. New York: Springer."},{"issue":"2","key":"7133_CR2","first-page":"595","volume":"9","author":"YS Zhang","year":"1999","unstructured":"Zhang, Y. S., Lu, Y. Q., & Pang, S. Q. (1999). Orthogonal arrays obtained by orthogonal decomposition of projection matrices. Statistica Sinica, 9(2), 595\u2013604.","journal-title":"Statistica Sinica"},{"key":"7133_CR3","unstructured":"Delsarte, P. (1973). An algebraic approach to the association schemes of coding theory. Philips Research Laboratores (suppl.), No. 10."},{"key":"7133_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. B. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41\u201347).","DOI":"10.1145\/586110.586117"},{"key":"7133_CR5","unstructured":"Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on research in security and privacy (pp. 197\u2013213)."},{"key":"7133_CR6","doi-asserted-by":"crossref","unstructured":"\u00c7amtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of the European symposium on research computer security (pp. 293\u2013308).","DOI":"10.1007\/978-3-540-30108-0_18"},{"issue":"3","key":"7133_CR7","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10623-012-9749-4","volume":"71","author":"MB Paterson","year":"2014","unstructured":"Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 433\u2013457.","journal-title":"Designs, Codes and Cryptography"},{"key":"7133_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-01877-0_12","volume":"5557","author":"KM Martin","year":"2009","unstructured":"Martin, K. M. (2009). On the applicability of combinatorial designs to key predistribution for wireless sensor networks. Lecture Notes in Computer Science, 5557, 124\u2013145.","journal-title":"Lecture Notes in Computer Science"},{"key":"7133_CR9","unstructured":"Lee, J., & Stinson, D. R. (2005). A combinatorial approach to key predistribution schemes for distributed sensor networks. In WCNC 2005, IEEE wireless computing and networking conference (pp. 1200\u20131205)."},{"issue":"4","key":"7133_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1002\/jcd.20086","volume":"14","author":"J Lee","year":"2006","unstructured":"Lee, J., & Stinson, D. R. (2006). Common intersection designs. Journal of Combinatorial Designs, 14(4), 251\u2013269.","journal-title":"Journal of Combinatorial Designs"},{"key":"7133_CR11","doi-asserted-by":"crossref","unstructured":"Lee, J., & Stinson, D. R. (2008). On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security 11(2), Article no. 5.","DOI":"10.1145\/1330332.1330333"},{"key":"7133_CR12","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-540-74742-0_40","volume":"4742","author":"S Ruj","year":"2007","unstructured":"Ruj, S., & Roy, B. (2007). Key predistribution schemes using partially balanced designs in wireless sensor networks. Lecture Notes in Computer Science, 4742, 431\u2013445.","journal-title":"Lecture Notes in Computer Science"},{"issue":"18","key":"7133_CR13","doi-asserted-by":"publisher","first-page":"8913","DOI":"10.1080\/03610926.2016.1197253","volume":"46","author":"SQ Pang","year":"2017","unstructured":"Pang, S. Q., Yan, R., & Li, S. (2017). Schematic saturated orthogonal arrays obtained by using the contractive replacement method. Communications in Statistics-Theory and Methods, 46(18), 8913\u20138924.","journal-title":"Communications in Statistics-Theory and Methods"},{"issue":"4","key":"7133_CR14","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1007\/s10255-017-0720-z","volume":"33","author":"SQ Pang","year":"2017","unstructured":"Pang, S. Q., & Chen, L. Y. (2017). Generalized Latin matrix and construction of orthogonal arrays. Acta Mathematicae Applicatae Sinica, 33(4), 1083\u20131092.","journal-title":"Acta Mathematicae Applicatae Sinica"},{"issue":"4","key":"7133_CR15","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s13226-018-0293-4","volume":"49","author":"SQ Pang","year":"2018","unstructured":"Pang, S. Q., Xu, W. J., Chen, G. Z., & Wang, Y. (2018). Construction of symmetric and asymmetric orthogonal arrays of strength $$t$$ from orthogonal partition. Indian Journal of Pure and Applied Mathematics, 49(4), 663\u2013669.","journal-title":"Indian Journal of Pure and Applied Mathematics"},{"issue":"5","key":"7133_CR16","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11390-008-9168-1","volume":"23","author":"JW Dong","year":"2008","unstructured":"Dong, J. W., Pei, D. Y., & Wang, X. L. (2008). A class of key predistribution schemes based on orthogonal arrays. Journal of Computer Science and Technology, 23(5), 825\u2013831.","journal-title":"Journal of Computer Science and Technology"},{"key":"7133_CR17","first-page":"53","volume":"37","author":"Q Gao","year":"2017","unstructured":"Gao, Q., Ma, W. P., & Li, X. P. (2017). A key predistribution scheme based on mixed-level orthogonal arrays. Ad Hoc & Sensor Wireless Networks, 37, 53\u201369.","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"7133_CR18","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.adhoc.2018.02.006","volume":"73","author":"Q Gao","year":"2018","unstructured":"Gao, Q., Ma, W. P., & Luo, W. (2018). Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Networks, 73, 40\u201350.","journal-title":"Ad Hoc Networks"},{"key":"7133_CR19","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.ins.2018.03.052","volume":"450","author":"SQ Pang","year":"2018","unstructured":"Pang, S. Q., Wang, X. N., Wang, J., Du, J., & Feng, M. (2018). Construction and count of 1-resilient rotation symmetric Boolean functions. Information Sciences, 450, 336\u2013342.","journal-title":"Information Sciences"},{"key":"7133_CR20","volume-title":"Combinatorial design: Constructions and analysis","author":"DR Stinson","year":"2003","unstructured":"Stinson, D. R. (2003). Combinatorial design: Constructions and analysis. New York: Springer."},{"key":"7133_CR21","unstructured":"Kendall, M., Kendall, E., & Kendall, W. S. (2012). A generalised formula for calculating the resilience of random key predistribution schemes. In IACR Cryptology Eprint Archive (p. 426)."},{"issue":"2","key":"7133_CR22","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y. S., et al. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228\u2013258.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"1","key":"7133_CR23","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10623-011-9590-1","volume":"67","author":"M Bose","year":"2013","unstructured":"Bose, M., Dey, A., & Mukerjee, R. (2013). Key predistribution schemes for distributed sensor networks via block designs. Designs, Codes and Cryptography, 67(1), 111\u2013136.","journal-title":"Designs, Codes and Cryptography"},{"key":"7133_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-79499-8_8","volume":"4990","author":"JW Dong","year":"2008","unstructured":"Dong, J. W., Pei, D. Y., & Wang, X. L. (2008). A key predistribution scheme based on 3-design. Lecture Notes in Computer Science, 4990, 81\u201392.","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"7133_CR25","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s11432-010-0005-0","volume":"53","author":"DY Pei","year":"2010","unstructured":"Pei, D. Y., Dong, J. W., & Rong, C. M. (2010). A novel key pre-distribution scheme for wireless distributed sensor networks. Science China Information Sciences, 53(2), 288\u2013298.","journal-title":"Science China Information Sciences"},{"issue":"3","key":"7133_CR26","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1214\/aoms\/1177729387","volume":"23","author":"KA Bush","year":"1952","unstructured":"Bush, K. A. (1952). Orthogonal arrays of index unity. The Annals of Mathematical Statistics, 23(3), 426\u2013434.","journal-title":"The Annals of Mathematical Statistics"},{"key":"7133_CR27","volume-title":"Handbook of combinatorial designs","author":"CJ Colbourn","year":"2007","unstructured":"Colbourn, C. J., & Dinitz, J. H. (2007). Handbook of combinatorial designs. Boca Raton: CRC Press."},{"issue":"4","key":"7133_CR28","doi-asserted-by":"publisher","first-page":"736","DOI":"10.4153\/CJM-1964-070-1","volume":"16","author":"SS Shrikhande","year":"1964","unstructured":"Shrikhande, S. S. (1964). Generalized Hadamard matrices and orthogonal arrays of strength two. Canadian Journal of Mathematics, 16(4), 736\u2013740.","journal-title":"Canadian Journal of Mathematics"},{"key":"7133_CR29","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1080\/01621459.1991.10475065","volume":"6","author":"JC Wang","year":"1991","unstructured":"Wang, J. C., & Wu, C. F. J. (1991). An approach for the construction of asymmetrical orthogonal arrays. Journal of the American Statistical Association, 6, 450\u2013456.","journal-title":"Journal of the American Statistical Association"},{"issue":"6","key":"7133_CR30","doi-asserted-by":"publisher","first-page":"2102","DOI":"10.1214\/aos\/1034713649","volume":"23","author":"R Mukerjee","year":"1995","unstructured":"Mukerjee, R., & Wu, C. F. J. (1995). On the existence of saturated and nearly saturated asymmetrical orthogonal arrays. The Annals of Statistics, 23(6), 2102\u20132115.","journal-title":"The Annals of Statistics"},{"key":"7133_CR31","first-page":"147","volume":"91","author":"YL Zhang","year":"2009","unstructured":"Zhang, Y. L. (2009). On schematic orthogonal arrays of strength two. ARS Combinatoria, 91, 147\u2013163.","journal-title":"ARS Combinatoria"},{"key":"7133_CR32","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0378-3758(96)00059-6","volume":"58","author":"AS Hedayat","year":"1997","unstructured":"Hedayat, A. S., Seiden, E., & Stufken, J. (1997). On the maximal number of factors and the enumeration of 3-symbol orthogonal arrays of strength 3 and index 2. Journal of Statistical Planning and inference, 58, 43\u201363.","journal-title":"Journal of Statistical Planning and inference"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07133-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07133-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07133-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:13:11Z","timestamp":1611965591000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07133-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,31]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7133"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07133-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,1,31]]},"assertion":[{"value":"31 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}