{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:11:53Z","timestamp":1729671113326,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/mahss.2008.4660126","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T13:32:56Z","timestamp":1225200776000},"page":"815-820","source":"Crossref","is-referenced-by-count":0,"title":["A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks"],"prefix":"10.1109","author":[{"given":"Tran Thanh","family":"Dai","sequence":"first","affiliation":[]},{"given":"Johnson I.","family":"Agbinya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/11496137_29","article-title":"efficient constructions for one-way hash chains","volume":"3531","author":"hu","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317803"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"12","first-page":"586","article-title":"a key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proc IEEE INFOCOM'04"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e91-b.8.2602"},{"key":"2","first-page":"197","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc IEEE Symposium on Security and Privacy"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497918"},{"journal-title":"Wireless Sensor Setworks Product Reference Guide","year":"2007","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348111"}],"event":{"name":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","start":{"date-parts":[[2008,9,29]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2008,10,2]]}},"container-title":["2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653771\/4660007\/04660126.pdf?arnumber=4660126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T08:57:03Z","timestamp":1497776223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4660126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/mahss.2008.4660126","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}