{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:36:06Z","timestamp":1730252166739,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/icmwcn.2007.4668198","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T13:53:13Z","timestamp":1226411593000},"page":"146-150","source":"Crossref","is-referenced-by-count":1,"title":["Path-Key Establishment for Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Noureddine","family":"Mehallegue","sequence":"first","affiliation":[]},{"given":"Emi","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Bouridane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"802.15.4-2003,wireless medium access control (mac) and physical layer (phy) specifications for low rate wireless personal area networks (lr-wpans)","year":"2003","author":"ieee std","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577968"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1023756.1023761"},{"key":"11","first-page":"326","article-title":"establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach","author":"zhu","year":"2003","journal-title":"IEEE Inetrnational Conference on Network Protocols"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1095921.1095928"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"year":"0","key":"2"},{"key":"1","article-title":"yogesh sankarasubramaniam and erdal cayirciand,a survey on sensor networks","author":"ian","year":"2002","journal-title":"IEEE Communications Magazine"},{"key":"10","first-page":"524","article-title":"pike: peer intermediaries for key estabishment in sensor networks","author":"chan","year":"2003","journal-title":"IEEE INFOCOM"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39757-4_22"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"4","first-page":"197","article-title":"rondom key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"9","article-title":"key infection: smart trust for smart dust","author":"chan","year":"2003","journal-title":"Proc IEEE Symp on Security and Privacy"},{"key":"8","volume":"2006","author":"li","year":"2006","journal-title":"A robust On-demand Path Key Establishment Framework via Random Key Pre-distribution for Wireless Sensor Networks"}],"event":{"name":"2007 9th IFIP International Conference on Mobile Wireless Communications Networks - (MWCN)","start":{"date-parts":[[2007,9,19]]},"location":"Cork","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 9th IFIP International Conference on Mobile Wireless Communications Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653120\/4668158\/04668198.pdf?arnumber=4668198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:27:56Z","timestamp":1489764476000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4668198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icmwcn.2007.4668198","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}