{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:02:01Z","timestamp":1729674121614,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/bmei.2011.6098723","type":"proceedings-article","created":{"date-parts":[[2011,12,16]],"date-time":"2011-12-16T13:29:51Z","timestamp":1324042191000},"page":"2067-2071","source":"Crossref","is-referenced-by-count":1,"title":["Security in ad-hoc sensor networks with pre-loaded Time Limited Memory Keys"],"prefix":"10.1109","author":[{"given":"Vadim","family":"Kimlaychuk","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"The selfish node: Increasing routing security in mobile ad hoc networks","author":"buchegger","year":"2001","journal-title":"IBM Research Report RR 3354"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2010.5676554"},{"journal-title":"AES proposal Rijndael","year":"1998","author":"daemen","key":"18"},{"journal-title":"Research Laboratory of Proactive Technologies Annual Report 2009","first-page":"53","year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24594"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5121\/ijngn.2010.2205"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179629"},{"journal-title":"Crossbow Homepage","year":"0","key":"2"},{"journal-title":"Constraints and approaches for distributed sensor network security","year":"2000","author":"carman","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"7"},{"journal-title":"Security in Sensor Networks Key Management Approaches","year":"2004","author":"radzevych","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"4","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","article-title":"Body area networks: A survey","volume":"16","author":"min","year":"2011","journal-title":"Springer Mobile Netw Appl"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"journal-title":"Key Management in Ad Hoc Networks","year":"0","author":"fokine","key":"8"}],"event":{"name":"2011 4th International Conference on Biomedical Engineering and Informatics (BMEI)","start":{"date-parts":[[2011,10,15]]},"location":"Shanghai, China","end":{"date-parts":[[2011,10,17]]}},"container-title":["2011 4th International Conference on Biomedical Engineering and Informatics (BMEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093307\/6098424\/06098723.pdf?arnumber=6098723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T07:28:26Z","timestamp":1497943706000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6098723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/bmei.2011.6098723","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}