{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:06Z","timestamp":1772196486180,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,12]],"date-time":"2007-08-12T00:00:00Z","timestamp":1186876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,12]]},"DOI":"10.1145\/1280940.1280992","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"236-241","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["MKPS"],"prefix":"10.1145","author":[{"given":"Farshid","family":"Delgosha","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Faramarz","family":"Fekri","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2007,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/.2005.1467103"},{"key":"e_1_3_2_1_2_1","first-page":"231","volume-title":"D. Chaum, R. L. Rivest, , and A","author":"Blom R.","year":"1982"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"C.\n       \n      Blundo\n     \n      \n      \n  \n   \n  Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell editor Proc. Adv. Cryptol. - CRYPTO'92 volume \n  740\n   of \n  Lect\n  . Notes Comput. Sci. pages \n  471\n  --\n  486 Berlin 1992\n  . \n  Springer-Verlag\n  .   C. Blundo et al. Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell editor Proc. Adv. Cryptol. - CRYPTO'92 volume 740 of Lect. Notes Comput. Sci. pages 471--486 Berlin 1992. Springer-Verlag.","DOI":"10.1007\/3-540-48071-4_33"},{"key":"e_1_3_2_1_4_1","first-page":"197","volume-title":"Proc. Symp. Security and Privacy","author":"Chan H.","year":"2003"},{"key":"e_1_3_2_1_5_1","first-page":"586","volume-title":"Proc. IEEE Conf. Comput. Commun. - INFOCOM'04","volume":"1","author":"Du W.","year":"2004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029110"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029111"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986868"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. First Ann. IEEE Commun. Society Conf. on Sensor Commun. and Net.","author":"Pishro-Nik H.","year":"2004"},{"key":"e_1_3_2_1_14_1","unstructured":"G. L. St\u00fcber. Principles of Mobile Communication. Kluwer Academic Boston 2nd edition 2001.   G. L. St\u00fcber. Principles of Mobile Communication. Kluwer Academic Boston 2nd edition 2001."}],"event":{"name":"IWCMC07: International Wireless Communications and Mobile Computing Conference","location":"Honolulu Hawaii USA","acronym":"IWCMC07","sponsor":["SIGDOC ACM Special Interest Group on Systems Documentation","ACM Association for Computing Machinery","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAPP ACM Special Interest Group on Applied Computing","SIGDOC ACM Special Interest Group for Design of Communications"]},"container-title":["Proceedings of the 2007 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280940.1280992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:59Z","timestamp":1750258679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280992"}},"subtitle":["a multivariate polynomial scheme for symmetric key-establishment in distributed sensor networks"],"short-title":[],"issued":{"date-parts":[[2007,8,12]]},"references-count":14,"alternative-id":["10.1145\/1280940.1280992","10.1145\/1280940"],"URL":"https:\/\/doi.org\/10.1145\/1280940.1280992","relation":{},"subject":[],"published":{"date-parts":[[2007,8,12]]},"assertion":[{"value":"2007-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}