{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:45Z","timestamp":1750307625690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,24]],"date-time":"2008-11-24T00:00:00Z","timestamp":1227484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,24]]},"DOI":"10.1145\/1497185.1497246","type":"proceedings-article","created":{"date-parts":[[2009,1,29]],"date-time":"2009-01-29T13:45:53Z","timestamp":1233236753000},"page":"291-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel key management algorithm in sensor networks"],"prefix":"10.1145","author":[{"given":"Omar","family":"Al-Jarrah","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology"}]},{"given":"Ramzy","family":"Saifan","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology"}]}],"member":"320","published-online":{"date-parts":[[2008,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tso T. Kerberos: An authentication service for computer networks","author":"Neuman BC","year":"1994","unstructured":"Neuman BC , Tso T. Kerberos: An authentication service for computer networks . IEEE Communications September 1994 ; 32(9). 33--38. Neuman BC, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications September 1994; 32(9). 33--38."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_3_1","volume-title":"New directions in cryptography","author":"Diffie W","year":"1976","unstructured":"Diffie W , Hellman ME. New directions in cryptography . IEEE Transactions on Information Theory November 1976 ; 22. 644--654. Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory November 1976; 22. 644--654."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_5_1","volume-title":"Digitalized signatures and public key functions as intractable as factorization. MIT\/LCS\/TR-212","author":"Rabin MO.","year":"1979","unstructured":"Rabin MO. Digitalized signatures and public key functions as intractable as factorization. MIT\/LCS\/TR-212 , Massachusetts Institute of Technology , 1979 . Rabin MO. Digitalized signatures and public key functions as intractable as factorization. MIT\/LCS\/TR-212, Massachusetts Institute of Technology, 1979."},{"volume-title":"Topics in Cryptology-CT-RSA 2003","author":"Hoffstein J","key":"e_1_3_2_1_6_1","unstructured":"Hoffstein J , Howgrave-Graham N , Pipher J , Silverman J , Whyte W. NTRUSign: Digital signatures using the NTRU lattice . In Topics in Cryptology-CT-RSA 2003 ; 2612 of LNCS. 122--140. Hoffstein J, Howgrave-Graham N, Pipher J, Silverman J, Whyte W. NTRUSign: Digital signatures using the NTRU lattice. In Topics in Cryptology-CT-RSA 2003; 2612 of LNCS. 122--140."},{"key":"e_1_3_2_1_7_1","volume-title":"Workshop on RFID Security","author":"Sakiyama K","year":"2006","unstructured":"Sakiyama K , Batina L , Mentens N , Preneel B , Verbauwhede I. Small-footprint ALU for public-key processors for pervasive security . Workshop on RFID Security , July 2006 . Sakiyama K, Batina L, Mentens N, Preneel B, Verbauwhede I. Small-footprint ALU for public-key processors for pervasive security. Workshop on RFID Security, July 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.388"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE Symposium on Security and Privacy May 11--14","author":"Chan H","year":"2003","unstructured":"Chan H , Perrig A , Song D. Random key predistribution schemes for sensor networks . in IEEE Symposium on Security and Privacy May 11--14 2003 , Berkeley, California. 197--213. Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. in IEEE Symposium on Security and Privacy May 11--14 2003, Berkeley, California. 197--213."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_13_1","volume-title":"Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM","author":"Du W","year":"2004","unstructured":"Du W , Deng J , Han YS , Chen S , Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 2004 . Du W, Deng J, Han YS, Chen S, Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029111"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"},{"volume-title":"INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies 2005; 1. 524--535","author":"Chan H","key":"e_1_3_2_1_16_1","unstructured":"Chan H , Perrig A. Pike : Peer intermediaries for key establishment in sensor networks . INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies 2005; 1. 524--535 . Chan H, Perrig A. Pike: Peer intermediaries for key establishment in sensor networks. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies 2005; 1. 524--535."},{"key":"e_1_3_2_1_17_1","volume-title":"Gouda M. Whisper: Local Secret Maintenance in Sensor Networks","author":"Naik V","year":"2003","unstructured":"Naik V , Arora A , Bapat S , Gouda M. Whisper: Local Secret Maintenance in Sensor Networks . 2003 . Naik V, Arora A, Bapat S, Gouda M. Whisper: Local Secret Maintenance in Sensor Networks. 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1678171"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"}],"event":{"name":"MoMM08: 6th International Conference on Mobile Computing and Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Linz Austria","acronym":"MoMM08"},"container-title":["Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1497185.1497246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1497185.1497246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:54Z","timestamp":1750250754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1497185.1497246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,24]]},"references-count":19,"alternative-id":["10.1145\/1497185.1497246","10.1145\/1497185"],"URL":"https:\/\/doi.org\/10.1145\/1497185.1497246","relation":{},"subject":[],"published":{"date-parts":[[2008,11,24]]},"assertion":[{"value":"2008-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}