{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:05:29Z","timestamp":1729641929607,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wiopt.2009.5291629","type":"proceedings-article","created":{"date-parts":[[2009,12,18]],"date-time":"2009-12-18T13:16:59Z","timestamp":1261142219000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"A.C.-F.","family":"Chan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"185","article-title":"On the key predistribution system: A practical solution to the key distribution problem","volume":"293","author":"matsumoto","year":"1988","journal-title":"LNCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_25"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330333"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1201\/9780203490204","author":"gross","year":"2003","journal-title":"Handbook of Graph Theory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"CRC Handbook of Applied Cryptography"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719802"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(88)90068-6"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"journal-title":"The Strange Logic of Random Graphs","year":"2000","author":"spencer","key":"25"},{"key":"26","first-page":"195","article-title":"On the de bruijn-good graphs","volume":"30","author":"zhang","year":"1987","journal-title":"Acta Math Sinica"},{"key":"3","article-title":"Constraints and approaches for distributed sensor network security","author":"carman","year":"2000","journal-title":"NAI Labs Technical Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892879"},{"key":"10","first-page":"586","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proc IEEE INFOCOM 04"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892879"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1201\/9781420049954","author":"colbourn","year":"1996","journal-title":"Handbook of Combinatorial Designs"},{"key":"6","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","article-title":"Certificate chain discovery in SPKI\/SDSI","volume":"9","author":"clarke","year":"2001","journal-title":"Journal of Computer Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/jgt.3190080408"},{"key":"4","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"9","first-page":"758","article-title":"A combinatorial problem","volume":"49","author":"de bruijn","year":"1946","journal-title":"Koninklijke Nederlandse Akademie v Wetenschappen"},{"year":"0","key":"8"}],"event":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt 2009","start":{"date-parts":[[2009,6,23]]},"location":"Seoul","end":{"date-parts":[[2009,6,27]]}},"container-title":["2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5286911\/5291544\/05291629.pdf?arnumber=5291629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T12:59:48Z","timestamp":1558702788000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5291629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2009.5291629","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}