{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T12:57:33Z","timestamp":1765544253606,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2005.1523886","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:51:59Z","timestamp":1160567519000},"page":"359-364","source":"Crossref","is-referenced-by-count":12,"title":["Self-certified group key generation for ad hoc clusters in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"O.","family":"Arazi","sequence":"first","affiliation":[]},{"family":"Hairong Qi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/3-540-47721-7_12"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/TC.2004.31"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1007\/3-540-46416-6_42"},{"key":"16","article-title":"Certification of dl\/ec keys","author":"arazi","year":"1999","journal-title":"Proceedings of the IEEE P1363 Study Group for Future Public-Key Cryptography Standards"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/JSAC.2004.842555"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/586115.586117"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/948109.948118"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICC.2004.1313241"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/990680.990707"},{"key":"2","first-page":"54","article-title":"Decentralized reactive clustering for collaborative processing in sensor networks","volume":"91","author":"qi","year":"2004","journal-title":"Proc of the IEEE 10th International Conference on Parallel and Distributed Systems (ICPADS)"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/JPROC.2003.814927"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/PERCOM.2005.18"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2005.1497918","article-title":"Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach","author":"zhang","year":"2005","journal-title":"Proceedings of the 2005 IEEE INFO COM"},{"key":"6","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proc of IEEE INFO COM 2004"},{"key":"5","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1029102.1029113"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SAHCN.2004.1381904"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/978-1-4615-3198-2"}],"event":{"name":"14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","location":"San Diego, CA, USA"},"container-title":["Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10216\/32582\/01523886.pdf?arnumber=1523886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T12:44:04Z","timestamp":1555850644000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccn.2005.1523886","relation":{},"subject":[]}}