{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:08:50Z","timestamp":1729652930382,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/wocn.2014.6923055","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:20:08Z","timestamp":1414009208000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Almost sure connectivity in secure wireless sensor network"],"prefix":"10.1109","author":[{"given":"Jyoti","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Bhupendra","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Subir Singh","family":"Lamba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892110"},{"journal-title":"EDCD Method for Discovering Connectivity Disruption in WSN","year":"0","author":"anbu karthick","key":"18"},{"key":"15","article-title":"A destination-based approach for cut detection in wireless sensor networks","author":"won","year":"2011","journal-title":"IEEE Trans Parallel Distributed Computers"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.178"},{"journal-title":"Key Ring Sizes in the Random Pairwise Key Distribution Scheme Submitted for Inclusion in the Program of the Twenty-second Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2011)","year":"0","author":"yagan","key":"13"},{"key":"14","first-page":"210217","author":"shrivastava","year":"2005","journal-title":"Detecting Cuts in Sensor Networks"},{"journal-title":"Connectivity Results Forftxt Random Key Graph ISIT","year":"2009","author":"yagan","key":"11"},{"journal-title":"Connectivity in Random Graphs Induced by A Key Pre Distribution Scheme-Small Key Pools","year":"0","author":"yagan","key":"12"},{"key":"3","first-page":"17","article-title":"On the evalution of random graph","volume":"5","author":"erdos","year":"1960","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1341731.1341734"},{"journal-title":"On the Random Graph Induced by A Random Key Predistribution Scheme under Full Visibility (Extended Version) Submitted for Inclusion in the Program of the IEEE International Symposium on Information Theory (ISIT 2008)","year":"2008","author":"yagan","key":"7"},{"key":"6","first-page":"33","volume":"32","author":"neuman","year":"1994","journal-title":"An Authentication Service for Computer Networks Communications Magazine IEEE"},{"journal-title":"Probability Springer- Verlag","year":"1984","author":"shiryayev","key":"5"},{"journal-title":"Diffie-Hellman Key Agreement Method","year":"0","key":"4"},{"journal-title":"Connectivity Properties of Secure Wireless Sensor Networks SASN04","year":"2004","author":"di pietro","key":"9"},{"journal-title":"Zero-One Laws for Connectivity in Random","year":"2012","author":"yagan","key":"8"}],"event":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","start":{"date-parts":[[2014,9,11]]},"location":"Vijayawada, Guntur District, Andhra Pradesh, India","end":{"date-parts":[[2014,9,13]]}},"container-title":["2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6912065\/6923038\/06923055.pdf?arnumber=6923055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:52:30Z","timestamp":1498171950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6923055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wocn.2014.6923055","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}