{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:35:05Z","timestamp":1729661705002,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/ccnc.2013.6488463","type":"proceedings-article","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T16:50:51Z","timestamp":1365180651000},"page":"308-316","source":"Crossref","is-referenced-by-count":2,"title":["A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs"],"prefix":"10.1109","author":[{"given":"M.","family":"Rezaeirad","sequence":"first","affiliation":[]},{"given":"M.","family":"Orooji","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mazloom","sequence":"additional","affiliation":[]},{"given":"D.","family":"Perkins","sequence":"additional","affiliation":[]},{"given":"M.","family":"Bayoumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"journal-title":"Perfectly-secure key distribution for dynamic conferences","year":"1995","author":"blundo","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39757-4_22"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1824766.1824767"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424813"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1340771.1340777"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2008.27"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577788"},{"key":"12","article-title":"A key management scheme using deployment knowledge for wireless sensor networks","author":"yu","year":"2008","journal-title":"IEEE Trans"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2005.1557068"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071338"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784870"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2012.6164370"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288120"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061710.00109"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.106"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632659"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.32"},{"journal-title":"Key distribution mechanisms for wireless sensor networks a survey","year":"2005","author":"camtepe","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2009.10.001","article-title":"Review: Wireless sensor network key management survey and taxonomy","volume":"33","author":"zhang","year":"2010","journal-title":"J Netw Comput Appl"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060603"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","author":"xiao","year":"2007","journal-title":"Comput Commun"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577968"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Security and Privacy 2003 Proceedings 2003 Symposium on"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.010"},{"key":"31","first-page":"290","article-title":"On random graphs","author":"erdos","year":"1959","journal-title":"Publication Math Inst of the Hungarian Academy Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"8","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"INFOCOM 2004 Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies"}],"event":{"name":"2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2013,1,11]]},"location":"Las Vegas, NV","end":{"date-parts":[[2013,1,14]]}},"container-title":["2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6479731\/6488412\/06488463.pdf?arnumber=6488463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:54:25Z","timestamp":1498028065000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6488463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2013.6488463","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}