{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:18:50Z","timestamp":1761675530391,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,9]],"date-time":"2007-09-09T00:00:00Z","timestamp":1189296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,9]]},"DOI":"10.1145\/1288107.1288120","type":"proceedings-article","created":{"date-parts":[[2007,9,26]],"date-time":"2007-09-26T17:32:33Z","timestamp":1190827953000},"page":"90-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["A random perturbation-based scheme for pairwise key establishment in sensor networks"],"prefix":"10.1145","author":[{"given":"Wensheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Iowa State University, Ames, IA"}]},{"given":"Minh","family":"Tran","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570664"},{"key":"e_1_3_2_1_4_1","volume-title":"Random Key Predistribution Schemes for Sensor Networks,\" IEEE Symposium on Research in Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song , \" Random Key Predistribution Schemes for Sensor Networks,\" IEEE Symposium on Research in Security and Privacy , 2003 . H. Chan, A. Perrig, and D. Song, \"Random Key Predistribution Schemes for Sensor Networks,\" IEEE Symposium on Research in Security and Privacy, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.705531"},{"key":"e_1_3_2_1_9_1","first-page":"1361","author":"Anderson R.","year":"1998","unstructured":"R. Anderson and M. Kuhn , \"Low cost attacks on tamper resistant devices,\" in Proceedings of Security Protocols, LNCS 1361 , 1998 . R. Anderson and M. Kuhn, \"Low cost attacks on tamper resistant devices,\" in Proceedings of Security Protocols, LNCS 1361, 1998.","journal-title":"\"Low cost attacks on tamper resistant devices,\" in Proceedings of Security Protocols, LNCS"},{"key":"e_1_3_2_1_10_1","volume-title":"CHES'99","author":"Handschuh H.","year":"1999","unstructured":"H. Handschuh , P. Pailer , and J. Stren , \" Probing attacks on tamper resistant devices,\" in Proceedings of Cryptographic Hardware and Embedded Systems , CHES'99 , 1999 . H. Handschuh, P. Pailer, and J. Stren, \"Probing attacks on tamper resistant devices,\" in Proceedings of Cryptographic Hardware and Embedded Systems, CHES'99, 1999."},{"key":"e_1_3_2_1_12_1","volume-title":"December","author":"Samyde D.","year":"2002","unstructured":"D. Samyde , S. Skorobogatov , R. Anderson , and J. Quisquater , \" On a new way to read data from memory,\" in Proceedings of First International IEEE Security in Storage Workshop , December 2002 . D. Samyde, S. Skorobogatov, R. Anderson, and J. Quisquater, \"On a new way to read data from memory,\" in Proceedings of First International IEEE Security in Storage Workshop, December 2002."},{"key":"e_1_3_2_1_13_1","unstructured":"\"Cotsbots: The mobile mote-based robots \" http:\/\/www-bsac.eecs.berkeley.edu\/projects\/cotsbots\/.  \"Cotsbots: The mobile mote-based robots \" http:\/\/www-bsac.eecs.berkeley.edu\/projects\/cotsbots\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986868"},{"key":"e_1_3_2_1_15_1","volume-title":"March","author":"Du W.","year":"2004","unstructured":"W. Du , J. Deng , Y. Han , and S. Chen , \" A key management scheme for wireless sensor networks using deployment knowledge,\" IEEE INFOCOM'04 , March 2004 . W. Du, J. Deng, Y. Han, and S. Chen, \"A key management scheme for wireless sensor networks using deployment knowledge,\" IEEE INFOCOM'04, March 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"e_1_3_2_1_17_1","volume-title":"Mar.","author":"Chan Haowen","year":"2005","unstructured":"Haowen Chan and Adrian Perrig , \"PIKE : Peer intermediaries for key establishment in sensor networks,\" in Proceedings of IEEE Infocom , Mar. 2005 . Haowen Chan and Adrian Perrig, \"PIKE: Peer intermediaries for key establishment in sensor networks,\" in Proceedings of IEEE Infocom, Mar. 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098922"},{"key":"e_1_3_2_1_19_1","volume-title":"October","author":"Malan D.","year":"2004","unstructured":"D. Malan , M. Welsh , and M. Smith , \" A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,\" First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON) , October 2004 . D. Malan, M. Welsh, and M. Smith, \"A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,\" First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), October 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_24_1","volume-title":"Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach,\" IEEE Infocom","author":"Zhang W.","year":"2005","unstructured":"W. Zhang and G. Cao , \" Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach,\" IEEE Infocom 2005 , March 2005. W. Zhang and G. Cao, \"Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach,\" IEEE Infocom 2005, March 2005."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Crossbow technology inc \" http:\/\/www.xbow.com 2004.  \"Crossbow technology inc \" http:\/\/www.xbow.com 2004."},{"key":"e_1_3_2_1_26_1","first-page":"86","volume-title":"Proceedings of the 1st International Workshop on Fast Software Encryption","author":"Rivest R.","year":"1994","unstructured":"R. Rivest , \" The rc5 encryption algorithm,\" in Proceedings of the 1st International Workshop on Fast Software Encryption , 1994 , pp. 86 -- 96 . R. Rivest, \"The rc5 encryption algorithm,\" in Proceedings of the 1st International Workshop on Fast Software Encryption, 1994, pp. 86--96."},{"key":"e_1_3_2_1_27_1","volume-title":"Tinysec: Tinyos link layer security proposal, version 1.0","author":"Karlof C.","year":"2002","unstructured":"C. Karlof , N. Sastry , U. Shankar , and D. Wagner , \" Tinysec: Tinyos link layer security proposal, version 1.0 ,\" 2002 . C. Karlof, N. Sastry, U. Shankar, and D. Wagner, \"Tinysec: Tinyos link layer security proposal, version 1.0,\" 2002."},{"key":"e_1_3_2_1_28_1","volume-title":"XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions.,\" Proc. of Crypto","author":"Bellare M.","year":"1995","unstructured":"M. Bellare , R. Guerin , and P. Rogaway , \" XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions.,\" Proc. of Crypto , 1995 . M. Bellare, R. Guerin, and P. Rogaway, \"XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions.,\" Proc. of Crypto, 1995."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031518"}],"event":{"name":"MobiCom\/MobiHoc '07: The Thirteenth Annual International Conference on Mobile Computing and Networking and The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Montreal Quebec Canada","acronym":"MobiCom\/MobiHoc '07"},"container-title":["Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288107.1288120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1288107.1288120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:02Z","timestamp":1750258682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288107.1288120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,9]]},"references-count":29,"alternative-id":["10.1145\/1288107.1288120","10.1145\/1288107"],"URL":"https:\/\/doi.org\/10.1145\/1288107.1288120","relation":{},"subject":[],"published":{"date-parts":[[2007,9,9]]},"assertion":[{"value":"2007-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}