{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:03Z","timestamp":1761611163057,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,5,25]]},"DOI":"10.1145\/1062689.1062698","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T04:31:47Z","timestamp":1123043507000},"page":"58-67","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":115,"title":["An efficient scheme for authenticating public keys in sensor networks"],"prefix":"10.1145","author":[{"given":"Wenliang","family":"Du","sequence":"first","affiliation":[{"name":"Syracuse University"}]},{"given":"Ronghua","family":"Wang","sequence":"additional","affiliation":[{"name":"Syracuse University"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"elliptic curve key agreement and key transport protocols","author":"Ansi","year":"1999","unstructured":"Ansi x9.62 , elliptic curve key agreement and key transport protocols . American Bankers Association , 1999 .]] Ansi x9.62, elliptic curve key agreement and key transport protocols. American Bankers Association, 1999.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Draft","author":"NIST","year":"2003","unstructured":"NIST , special publication 800-57 : Recommendation for key management. part 1: General guideline . Draft , January , 2003 .]] NIST, special publication 800-57: Recommendation for key management. part 1: General guideline. Draft, January, 2003.]]"},{"key":"e_1_3_2_1_3_1","first-page":"213","volume":"2139","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-based encryption from the weil pairing. In Proceedigns of CRYPTO, LNCS 2139 , pages 213 -- 229 , 2001 .]] D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proceedigns of CRYPTO, LNCS 2139, pages 213--229, 2001.]]","journal-title":"Identity-based encryption from the weil pairing. In Proceedigns of CRYPTO, LNCS"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"e_1_3_2_1_5_1","volume-title":"NAI Labs","author":"Carman D.W.","year":"2000","unstructured":"D.W. Carman , P.S. Kruus , and B.J. Matt . Constrains and approaches for distributed sensor network security. Technical report , NAI Labs , 2000 .]] D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.]]"},{"key":"e_1_3_2_1_6_1","first-page":"197","volume-title":"IEEE Symposium on Research in Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song . Random key predistribution schemes for sensor networks . In IEEE Symposium on Research in Security and Privacy , pages 197 -- 213 , 2003 .]] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, pages 197--213, 2003.]]"},{"key":"e_1_3_2_1_7_1","unstructured":"Crossbow Technology Inc. Wireless sensor networks. http:\/\/www.xbow.com\/. 2004.]]  Crossbow Technology Inc. Wireless sensor networks. http:\/\/www.xbow.com\/. 2004.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_9_1","first-page":"586","volume-title":"Proceedings of the IEEE Infocom 04","author":"Du W.","year":"2004","unstructured":"W. Du , J. Deng , Y. S. Han , S. Chen , and P. K. Varshney . A key management scheme for wireless sensor networks using deployment knowledge . In Proceedings of the IEEE Infocom 04 , pages 586 -- 597 , Hongkong, China , March 27-31 2004 .]] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE Infocom 04, pages 586--597, Hongkong, China, March 27-31 2004.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"e_1_3_2_1_11_1","volume-title":"Us secure hash algorithm 1 (SHA1). IETF RFC","author":"Eastlake D.","year":"2001","unstructured":"D. Eastlake and P. Jones . Us secure hash algorithm 1 (SHA1). IETF RFC 3174, September 2001 .]] D. Eastlake and P. Jones. Us secure hash algorithm 1 (SHA1). IETF RFC 3174, September 2001.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941372"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_2"},{"key":"e_1_3_2_1_15_1","volume-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs","author":"Gura N.","year":"2004","unstructured":"N. Gura , A. Patel , A. Wander , H. Eberle , and S. C. Shantz . Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs . August 11-13 2004 .]] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. August 11-13 2004.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_17_1","volume-title":"Probability and Random Processes for Electrical Engineering","author":"Leon-Garcia A.","year":"1994","unstructured":"A. Leon-Garcia . Probability and Random Processes for Electrical Engineering . Reading, MA : Addison-Wesley Publishing Company , Inc., second edition, 1994 .]] A. Leon-Garcia. Probability and Random Processes for Electrical Engineering. Reading, MA: Addison-Wesley Publishing Company, Inc., second edition, 1994.]]"},{"key":"e_1_3_2_1_18_1","first-page":"263","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium","author":"Liu D.","year":"2003","unstructured":"D. Liu and P. Ning . Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks . In Proceedings of the 10th Annual Network and Distributed System Security Symposium , pages 263 -- 276 , February 2003 .]] D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263--276, February 2003.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"e_1_3_2_1_24_1","volume-title":"Internet Request for Comment RFC","author":"Rivest R.","year":"1992","unstructured":"R. Rivest . The MD5 message-digest algorithm . In Internet Request for Comment RFC 1321, April 1992 .]] R. Rivest. The MD5 message-digest algorithm. In Internet Request for Comment RFC 1321, April 1992.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031518"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"}],"event":{"name":"MobiHoc05: The Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing 2005","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Urbana-Champaign IL USA","acronym":"MobiHoc05"},"container-title":["Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1062689.1062698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T03:45:41Z","timestamp":1673149541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1062689.1062698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,25]]},"references-count":27,"alternative-id":["10.1145\/1062689.1062698","10.1145\/1062689"],"URL":"https:\/\/doi.org\/10.1145\/1062689.1062698","relation":{},"subject":[],"published":{"date-parts":[[2005,5,25]]},"assertion":[{"value":"2005-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}