{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:06:17Z","timestamp":1729667177125,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875260","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"2381-2385","source":"Crossref","is-referenced-by-count":20,"title":["On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme"],"prefix":"10.1109","author":[{"given":"Faruk","family":"Yavuz","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Osman","family":"Yagan","sequence":"additional","affiliation":[]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962806"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176346079"},{"journal-title":"K-connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On\/off Channel Model","year":"2012","author":"zhao","key":"17"},{"key":"23","first-page":"261","article-title":"On the strength of connectedness of random graphs","author":"erdos","year":"1961","journal-title":"Acta Math Acad Sci Hungar"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2189353"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620734"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620654"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2219578"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.03.001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2265694"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1341731.1341734"},{"key":"3","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc of IEEE S&P"},{"journal-title":"Towards K-connectivity of the Random Graph Induced by A Pairwise Key Predistribution Scheme with Unreliable Links","year":"0","author":"yavuz","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283588"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579431"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068"},{"key":"5","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","volume":"30","author":"xiao","year":"2007","journal-title":"Computer Communications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2011.5930024"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032718"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875260.pdf?arnumber=6875260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:21:37Z","timestamp":1602688897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875260","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}