{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:24:42Z","timestamp":1729610682708,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345379","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T10:43:49Z","timestamp":1260441829000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Key distribution scheme without deployment knowledge"],"prefix":"10.1109","author":[{"given":"Pranav","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Joy","family":"Kuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989475"},{"year":"0","key":"16"},{"key":"13","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"IEEE INFOCOM 2004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72685-2_58"},{"key":"11","article-title":"Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach","author":"zhu","year":"2003","journal-title":"Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"3","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","article-title":"Perfectly-secure key distribution for dynamic conferences","volume":"740","author":"blundo","year":"1993","journal-title":"Lecture Notes in Computer Science"},{"year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2007.382602"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"7","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Research in Security and Privacy"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080798"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345379.pdf?arnumber=5345379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:40:33Z","timestamp":1497825633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345379","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}