{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:51:55Z","timestamp":1725540715572},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/icmlc.2014.7009147","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:52:15Z","timestamp":1421722335000},"page":"390-395","source":"Crossref","is-referenced-by-count":0,"title":["Key management for a large-scale wireless sensor network"],"prefix":"10.1109","author":[{"family":"Huei-Wen Ferng","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Nurhakim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062696"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.314"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70753"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313226"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6612-9"},{"key":"20","article-title":"Statistical en-route filtering of injected false data in sensor networks","author":"ye","year":"2004","journal-title":"Proc IEEE INFOCOM '04"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301328"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"2","first-page":"471","article-title":"Perfectly-secure key distribution for dynamic conferences","author":"blundo","year":"1992","journal-title":"Proc International Cryptology Conference '92"},{"key":"10","article-title":"Serloc: Secure rangeindependent localization for wireless sensor networks","author":"lazos","year":"2004","journal-title":"Proc ACM International Conference Mobile Computing and Networking '04"},{"key":"1","first-page":"335","article-title":"An optimal class of symmetric key generation systems","author":"blom","year":"1984","journal-title":"Proc Eurocrypt '84"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"4","first-page":"197","article-title":"Random key predistribution schemes for sensor network","author":"chan","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"journal-title":"Foundations of Cryptography Basic Tools","year":"2000","author":"goldreich","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258265"}],"event":{"name":"2014 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2014,7,13]]},"location":"Lanzhou, China","end":{"date-parts":[[2014,7,16]]}},"container-title":["2014 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6991348\/7009076\/07009147.pdf?arnumber=7009147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:26:25Z","timestamp":1602689185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7009147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2014.7009147","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}