{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:25Z","timestamp":1772196505465,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1109\/ccnc.2009.4784870","type":"proceedings-article","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T23:13:08Z","timestamp":1235085188000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge"],"prefix":"10.1109","author":[{"given":"Ngo Trong","family":"Canh","sequence":"first","affiliation":[]},{"given":"P. T. H.","family":"Truc","sequence":"additional","affiliation":[]},{"given":"Tran Hoang","family":"Hai","sequence":"additional","affiliation":[]},{"given":"Le Xuan","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444084"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424812"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2008.27"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39757-4_22"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"6","first-page":"471","article-title":"perfect-secure key distribution of dynamic conferences","author":"blundo","year":"1993"},{"key":"5","first-page":"197","article-title":"a key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"23rd Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom'04"},{"key":"4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Security and Privacy 2003 Proceedings"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424813"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"}],"event":{"name":"2009 6th IEEE Consumer Communications and Networking Conference (CCNC)","location":"Las Vegas, Nevada, USA","start":{"date-parts":[[2009,1,10]]},"end":{"date-parts":[[2009,1,13]]}},"container-title":["2009 6th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4784683\/4784684\/04784870.pdf?arnumber=4784870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T16:57:13Z","timestamp":1497805033000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4784870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2009.4784870","relation":{},"subject":[],"published":{"date-parts":[[2009,1]]}}}