{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:09:11Z","timestamp":1761401351969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T00:00:00Z","timestamp":1194307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,6]]},"DOI":"10.1145\/1322263.1322286","type":"proceedings-article","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T14:39:06Z","timestamp":1196433546000},"page":"233-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Message-in-a-bottle"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Kuo","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Mark","family":"Luk","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Rohit","family":"Negi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2007,11,6]]},"reference":[{"volume-title":"Symposium on Network and Distributed Systems Security (NDSS)","year":"2002","author":"Balfanz D.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067177"},{"volume-title":"Proceedings of IEEE International Conference on Network Protocols","year":"2004","author":"Chan H.","key":"e_1_3_2_1_5_1"},{"volume-title":"IEEE Symposium on Security and Privacy","year":"2003","author":"Chan H.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ChipCon Products from Texas Instrments. CC2420 Data Sheet.  ChipCon Products from Texas Instrments. CC2420 Data Sheet ."},{"key":"e_1_3_2_1_8_1","unstructured":"Concentric Technology Solutions. RF Shield Box. http:\/\/www.rfshieldbox.com\/RF_Products.htm.  Concentric Technology Solutions. RF Shield Box. http:\/\/www.rfshieldbox.com\/RF_Products.htm."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134685"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741340"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080798"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236421"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0583102406061499"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_23_1","unstructured":"Moteiv Corp. Telos Data Sheet.  Moteiv Corp. Telos Data Sheet ."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842555"},{"volume-title":"Prentice-Hall","year":"2001","author":"Rappaport T.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"e_1_3_2_1_28_1","unstructured":"Sensys Networks. Components: VSN240 vehicle sensor nodes. http:\/\/www.sensysnetworks.com\/vsn240.html.  Sensys Networks. Components: VSN240 vehicle sensor nodes. http:\/\/www.sensysnetworks.com\/vsn240.html."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"volume-title":"Proceedings of Security Protocols Workshop 2000","year":"2000","author":"Stajano F.","key":"e_1_3_2_1_30_1"},{"volume-title":"7th International Workshop. Springer Verlag","year":"1999","author":"Stajano F.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"YSI Environmental. Environmental products. http:\/\/www.ysi.com\/index.html.  YSI Environmental. Environmental products. http:\/\/www.ysi.com\/index.html."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"},{"volume-title":"ZigBee Alliance","year":"2005","author":"Alliance ZigBee","key":"e_1_3_2_1_34_1"}],"event":{"name":"SenSys07: The 5th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","NSF National Science Foundation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Sydney Australia","acronym":"SenSys07"},"container-title":["Proceedings of the 5th international conference on Embedded networked sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1322263.1322286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1322263.1322286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:59Z","timestamp":1750253939000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1322263.1322286"}},"subtitle":["user-friendly and secure key deployment for sensor nodes"],"short-title":[],"issued":{"date-parts":[[2007,11,6]]},"references-count":34,"alternative-id":["10.1145\/1322263.1322286","10.1145\/1322263"],"URL":"https:\/\/doi.org\/10.1145\/1322263.1322286","relation":{},"subject":[],"published":{"date-parts":[[2007,11,6]]},"assertion":[{"value":"2007-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}