{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:39:06Z","timestamp":1729625946230,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/isads.2009.5207366","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T15:09:10Z","timestamp":1251126550000},"page":"1-6","source":"Crossref","is-referenced-by-count":24,"title":["Secure decentralized data transfer against node capture attacks for wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Eitaro","family":"Kohno","sequence":"first","affiliation":[]},{"given":"Tomoyuki","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Yoshiaki","family":"Kakuda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"313","article-title":"safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proceedings of American Federation of Information Processing Societies National Computer Conference"},{"key":"17","first-page":"441","article-title":"key distribution via shared secret schemes","author":"simmons","year":"1992","journal-title":"Contemporary Cryptology The Science Of Information Integrity"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"16","first-page":"237","article-title":"security in wireless sensor networks: a survey","author":"zhang","year":"2007","journal-title":"Security in Sensor Networks"},{"key":"13","first-page":"40","article-title":"mica, the commercialization of microsensor motes","volume":"19","author":"horton","year":"2002","journal-title":"SENSORS"},{"key":"14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/356989.356998","article-title":"system architecture directions for networked sensors","volume":"35","author":"hill","year":"2000","journal-title":"ACM SIGPLAN Notices"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180359"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948148.948149"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"journal-title":"Radio Broadcasting Systems DAta Radio Channel (DARC) System for Wireless Infotainment Forwarding and Teledistribution","year":"2002","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"journal-title":"Handbook of Sensor Networks Algorithms and Architectures","year":"2005","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"7","first-page":"197","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"6","doi-asserted-by":"crossref","first-page":"3743","DOI":"10.1109\/ICC.2004.1313241","article-title":"probabilistic distributed key pre-distribution for mobile ad hoc networks","volume":"6","author":"chan","year":"2004","journal-title":"Proceedings of IEEE International Conference on Commununications (ICC 2004)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"}],"event":{"name":"2009 International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2009,3,23]]},"location":"Athens, Greece","end":{"date-parts":[[2009,3,25]]}},"container-title":["2009 International Symposium on Autonomous Decentralized Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5185482\/5207317\/05207366.pdf?arnumber=5207366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:05:19Z","timestamp":1497827119000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5207366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isads.2009.5207366","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}