{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:10:17Z","timestamp":1761401417385,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554456","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"452-459","source":"Crossref","is-referenced-by-count":3,"title":["Deterministic schemes for key distribution in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Abhishek","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Joy","family":"Kuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Key predistribution schemes for sensor networks using lines and points over a finite geometry","author":"kaji","year":"2006","journal-title":"IEEE SECON (poster paper)"},{"key":"ref11","article-title":"Key distribution mechanisms for wireless sensor networks: A survey","author":"camtepe","year":"2005","journal-title":"Tech Rep TR-05&#x2013;07"},{"key":"ref12","article-title":"Reexamining probabilistic vs deterministic key management in mobile ad hoc networks","author":"xu","year":"2007","journal-title":"IEEE International Symposium on Information Theory (ISIT)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref14","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of IEEE Symposium on Research in Security and Privacy"},{"key":"ref15","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proceedings of The IEEE Infocom"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986868"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"ref18","first-page":"1200","article-title":"A combinatorial approach to key predistribution for distributed sensor networks","author":"lee","year":"2005","journal-title":"IEEE WCNC"},{"key":"ref19","first-page":"294","article-title":"Deterministic key pre-distribution schemes for distributed sensor networks","volume":"lncs 3357","author":"lee","year":"2005","journal-title":"ACM Symp Applied Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990704"},{"key":"ref3","first-page":"104","article-title":"Tampering with motes: Realworld physical attacks on wireless sensor networks","author":"becher","year":"2006","journal-title":"SPC 2006 LNCS 3934"},{"key":"ref6","article-title":"Sensor networks: Evolution, opportunities, and challenges","volume":"91","author":"chong","year":"2003","journal-title":"Proceedings of the IEEE"},{"key":"ref5","article-title":"Wireless sensor networks for battlefield surveillance","author":"bokareval","year":"2006","journal-title":"Land Warfare Conference"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/11964254_3","article-title":"Low-cost elliptic curve cryptography for wireless sensor networks","volume":"4357","author":"batina","year":"2006","journal-title":"3rd European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/11935308_37","article-title":"Efficient implementation of public key crypto systems on mote sensors (short paper)","author":"wang","year":"2006","journal-title":"International Conference of Information and Communication Security (ICICS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.93"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_6"},{"key":"ref20","article-title":"Combinatorial design of key diistribution mechanisms for wireless sensor networks","volume":"15","author":"camtepe","year":"2007","journal-title":"IEEEIACM Transactions on Networking"},{"key":"ref21","article-title":"Deterministic schemes for key distribution in wireless sensor networks","author":"gupta","year":"2007","journal-title":"Tech Rep TR-AJ-07"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554456.pdf?arnumber=4554456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:38:32Z","timestamp":1497778712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554456","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}