{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:51:05Z","timestamp":1729626665976,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/apcc.2013.6765983","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:58:42Z","timestamp":1395327522000},"page":"427-432","source":"Crossref","is-referenced-by-count":4,"title":["The multiple-key blom's scheme for key establishment in mobile ad hoc sensor networks"],"prefix":"10.1109","author":[{"given":"Mee Loong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Al-Anbuky","sequence":"additional","affiliation":[]},{"given":"William","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Notes on Linear Algebra","year":"2006","author":"cameron","key":"19"},{"journal-title":"TinyOS Programming","year":"2006","author":"levis","key":"22"},{"key":"17","first-page":"4045","article-title":"An improved matrix key predistribution scheme for wireless sensor networks","author":"chen","year":"2008","journal-title":"International Conference on Embedded Software Systems"},{"key":"23","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/11935308_37","article-title":"Efficient implementation of public key cryptosystems on mote sensors (short paper","volume":"4307","author":"wang","year":"2006","journal-title":"International Conference on Information and Communication Security (ICICS) LNCS"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2050140"},{"key":"15","doi-asserted-by":"crossref","first-page":"169","DOI":"10.4134\/CKMS.2003.18.1.169","article-title":"Multiparty key agreement protocol based on symmetric techniques","volume":"18","author":"lee","year":"2003","journal-title":"Communications of the Korean Mathematical Society"},{"key":"16","article-title":"A pairwise key predistribution scheme for wirele ss sensor networks","author":"du","year":"2003","journal-title":"Proceedings of the Conference on Computer and Communications Security"},{"key":"13","article-title":"Perfectly-secure key distribution for dynamic conferences","author":"blundo","year":"1995","journal-title":"Dipartimento di Informatica Ed Applicazioni"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_39"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2008.4610921"},{"key":"12","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","article-title":"TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks","volume":"34","author":"oliveira","year":"0","journal-title":"Computer Communications"},{"year":"2012","key":"21"},{"key":"3","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"0","journal-title":"Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems"},{"year":"0","author":"barker","key":"20"},{"journal-title":"An Optimal Class of Symmetric Key Generation Systems","year":"1984","author":"blom","key":"2"},{"key":"1","first-page":"231","article-title":"A fast and efficient key agreement scheme for wireless sensor networks","author":"yang","year":"2012","journal-title":"International Conference on Wireless and Mobile Communications Venice"},{"key":"10","first-page":"213","article-title":"Identity-based encryption from the weil pairing","volume":"2001","author":"boneh","year":"2001","journal-title":"Proceedings of Crypto"},{"journal-title":"Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks","year":"2009","author":"lederer","key":"7"},{"key":"6","article-title":"Optimized implementation of elliptic curve based additive homomorphicencryption for wireless sensor networks","author":"ugus","year":"2007","journal-title":"2nd Workshop on Embedded Systems Security-WESS'2007"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"8","first-page":"580","article-title":"On the energy cost of communications and cryptography in wireless sensor networks","volume":"10","author":"de meulenaer","year":"2008","journal-title":"IEEE i International Conference on Wireless & Mobile Computing Networking & Communication"}],"event":{"name":"2013 19th Asia-Pacific Conference on Communications (APCC)","start":{"date-parts":[[2013,8,29]]},"location":"Denpasar, Indonesia","end":{"date-parts":[[2013,8,31]]}},"container-title":["2013 19th Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6749272\/6765904\/06765983.pdf?arnumber=6765983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:00:30Z","timestamp":1498111230000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6765983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/apcc.2013.6765983","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}