{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:24Z","timestamp":1750307904403,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,1,31]],"date-time":"2008-01-31T00:00:00Z","timestamp":1201737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Information and Communication, Korea (MIC)","award":["IITA-2006-C1090-0602-0002"],"award-info":[{"award-number":["IITA-2006-C1090-0602-0002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,1,31]]},"DOI":"10.1145\/1352793.1352885","type":"proceedings-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T15:57:23Z","timestamp":1206460643000},"page":"441-447","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network"],"prefix":"10.1145","author":[{"given":"Nguyen Thi Thanh","family":"Huyen","sequence":"first","affiliation":[{"name":"Kyung Hee University, South Korea"}]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[{"name":"Kyung Hee University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2008,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.106"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2006.9"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"e_1_3_2_1_4_1","first-page":"197","volume-title":"IEEE Symposium on Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song .: Random key predistribution schemes for sensor networks . IEEE Symposium on Security and Privacy , Berkeley, California, May 11--14 , 2003 , pp. 197 -- 123 . H. Chan, A. Perrig, and D. Song.: Random key predistribution schemes for sensor networks. IEEE Symposium on Security and Privacy, Berkeley, California, May 11--14, 2003, pp. 197--123."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2007.382602"},{"key":"e_1_3_2_1_6_1","volume-title":"Kwangjo Kim.: State-Based Key Management Scheme for Wireless Sensor Networks. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference","author":"Park Jaemin","year":"2005","unstructured":"Jaemin Park , Zeen Kim , and Kwangjo Kim.: State-Based Key Management Scheme for Wireless Sensor Networks. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference , Nov. 2005 . Jaemin Park, Zeen Kim, and Kwangjo Kim.: State-Based Key Management Scheme for Wireless Sensor Networks. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Nov. 2005."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013235.1013320"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE INFOCOM","author":"Du Wenliang","year":"2004","unstructured":"Wenliang Du , Jing Deng , Yunghsiang S. Han , Shigang Chen , and Pramod K . Varshney.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge . IEEE INFOCOM 04, March 2004 . Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 04, March 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.253271"},{"key":"e_1_3_2_1_13_1","first-page":"326","volume-title":"Sushil Jajodia.: Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Processings of the 11th IEEE International Conference on Network Protocols","author":"Zhu Sencun","year":"2003","unstructured":"Sencun Zhu , Shouhuai Xu , Sanjeev Setia , and Sushil Jajodia.: Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Processings of the 11th IEEE International Conference on Network Protocols , November 2003 , pp. 326 -- 335 . Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia.: Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Processings of the 11th IEEE International Conference on Network Protocols, November 2003, pp. 326--335."},{"key":"e_1_3_2_1_14_1","author":"Carman David W.","year":"2005","unstructured":"David W. Carman .: New directions in Sensor Network Key Management. International Journal of Distributed Sensor Networks, 3--15 , 2005 . David W. Carman.: New directions in Sensor Network Key Management. International Journal of Distributed Sensor Networks, 3--15, 2005.","journal-title":"Sensor Network Key Management. International Journal of Distributed Sensor Networks, 3--15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"}],"event":{"name":"ICUIMC08: The Second International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGMOD ACM Special Interest Group on Management of Data"],"location":"Suwon Korea","acronym":"ICUIMC08"},"container-title":["Proceedings of the 2nd international conference on Ubiquitous information management and communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352793.1352885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:40Z","timestamp":1750258060000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,31]]},"references-count":14,"alternative-id":["10.1145\/1352793.1352885","10.1145\/1352793"],"URL":"https:\/\/doi.org\/10.1145\/1352793.1352885","relation":{},"subject":[],"published":{"date-parts":[[2008,1,31]]},"assertion":[{"value":"2008-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}