{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:46:32Z","timestamp":1729665992961,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/fskd.2012.6234123","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T23:43:25Z","timestamp":1342741405000},"page":"2061-2064","source":"Crossref","is-referenced-by-count":0,"title":["A multi-phase key pre-distribution scheme based on hash chain"],"prefix":"10.1109","author":[{"given":"Yi","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yongfeng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Liangrui","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.99"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2003.1197877"},{"key":"10","first-page":"2459","article-title":"A key management scheme for dense wireless sensor networks","volume":"14","author":"li","year":"2011","journal-title":"Information An International Interdisciplinary Journal"},{"key":"1","first-page":"1","article-title":"Wireless sensor network security: A survey","author":"walters","year":"2006","journal-title":"M In Security in Distributed Grid and Pervasive Computing CRC Press"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986200"},{"key":"6","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"C Proceedings 2003 Symposium on Security and Privacy"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068.009"},{"key":"4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","article-title":"A key-management scheme for distributed sensor network","author":"eschenauer","year":"2002","journal-title":"C Conference on Computer and Communications Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2717"},{"key":"8","first-page":"335","article-title":"An optimal class of symmetric key generation systems","author":"blom","year":"1984","journal-title":"C Advances in Cryptology Proceedings of EUROCRYPT 84-A Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"11","first-page":"710","article-title":"An improved random key predistribution scheme in wireless sensor network","volume":"35","author":"jia-hao","year":"2006","journal-title":"Journal of University of Electronic Science and Technology of China"}],"event":{"name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, Sichuan, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227654\/6233707\/06234123.pdf?arnumber=6234123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T08:29:01Z","timestamp":1714206541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6234123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/fskd.2012.6234123","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}