{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:27Z","timestamp":1730280567853,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761299","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"622-629","source":"Crossref","is-referenced-by-count":0,"title":["Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localization"],"prefix":"10.1109","author":[{"given":"Pinaki","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Sarbajit","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"5","article-title":"Clique size in sensor networks with key pre-distribution based on transversal design int","volume":"1","author":"chakrabarti","year":"2005","journal-title":"Journal of Distributed Sensor Networks"},{"key":"2","article-title":"Key distribution mechanisms for wireless sensor networks: A survey","author":"amtepe","year":"2005","journal-title":"Technical Report"},{"key":"10","first-page":"772","volume":"19","author":"lidl","year":"2008","journal-title":"Finite Fields"},{"key":"1","first-page":"293","article-title":"Combinatorial design of key distribution mechanisms for wireless sensor networks","volume":"3193","author":"camtepe","year":"2004","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"7","first-page":"41","article-title":"A key-management scheme for distributed sensor networks","author":"gligor","year":"2002","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"6","article-title":"A key predistribution scheme for sensor networks using deployment knowledge","volume":"3","author":"du","year":"2006","journal-title":"IEEE Trans Dependable Sec Comput"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_25"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0085-4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"8","first-page":"2012","article-title":"Contemporaly abstract algebra houghton mifflin","volume":"9","author":"gallian","year":"0","journal-title":"College Div"},{"key":"11","article-title":"Stinson, a combinatorial approach to key predistribution for distributed sensor networks","author":"lee","year":"2005","journal-title":"IEEE Wireless Communications and Networking Conference 2005 WCNC"},{"key":"12","first-page":"2008","article-title":"On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs acm trans","volume":"2","author":"lee","year":"0","journal-title":"Lrif Syst Secul I"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761299.pdf?arnumber=6761299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:51:36Z","timestamp":1490291496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761299","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}