{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:58Z","timestamp":1750307578221,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["2009-0069457"],"award-info":[{"award-number":["2009-0069457"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656026","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"555-560","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Identity-based secure protocol scheme for wireless sensor network"],"prefix":"10.1145","author":[{"given":"Sang-Ho","family":"Na","sequence":"first","affiliation":[{"name":"KyungHee University, South Korea"}]},{"given":"Kyu-Jin","family":"Kim","sequence":"additional","affiliation":[{"name":"KyungHee University, South Korea"}]},{"given":"Mohammad Mehedi","family":"Hassan","sequence":"additional","affiliation":[{"name":"KyungHee University, South Korea"}]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[{"name":"KyungHee University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A reliable 2-mode authentication framework for Ubiquitous sensor network","author":"Huyen","year":"2008","unstructured":"T. T. Huyen , Eui-Nam huh , A reliable 2-mode authentication framework for Ubiquitous sensor network . Journal of Korean Society for Internet Information , 2008 T. T. Huyen, Eui-Nam huh, A reliable 2-mode authentication framework for Ubiquitous sensor network. Journal of Korean Society for Internet Information, 2008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_3_1","volume-title":"Ver 1.0, http\/\/discovery.csc.ncsu.edu\/software\/TinyECC","author":"Tiny ECC","year":"2007","unstructured":"Tiny ECC : A Configurable Library for Elliptic Curve Cryptography in Wiress Sensor Networks , Ver 1.0, http\/\/discovery.csc.ncsu.edu\/software\/TinyECC , 2007 . 2. 11. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wiress Sensor Networks, Ver 1.0, http\/\/discovery.csc.ncsu.edu\/software\/TinyECC, 2007. 2. 11."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_5_1","first-page":"326","author":"Zhu S.","year":"2003","unstructured":"S. Zhu , S. Xu , S. Setia , and S. Jajodia , \"Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,\" in Proc. of the 11th IEEE International Conference on Network Protocols , pp. 326 -- 335 , Nov. 2003 . S. Zhu, S. Xu, S. Setia, and S. Jajodia, \"Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,\" in Proc. of the 11th IEEE International Conference on Network Protocols, pp. 326--335, Nov. 2003.","journal-title":"of the 11th IEEE International Conference on Network Protocols"},{"key":"e_1_3_2_1_6_1","first-page":"524","volume-title":"Perrig PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In IEEE Proc. the 24th Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"1","author":"Chan A.","year":"2005","unstructured":"H. Chan and A. Perrig PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In IEEE Proc. the 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 1 , pp. 524 -- 535 , 2005 H. Chan and A. Perrig PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In IEEE Proc. the 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 1, pp. 524--535, 2005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986868"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of International Conference on Advances in Cryptology CRYPTO'84","author":"Shamir A.","year":"1984","unstructured":"Shamir A. Identity-based cryptography and signature schemes. Advances in Cryptology , Proceedings of International Conference on Advances in Cryptology CRYPTO'84 , Aug 19 --22 , 1984 Shamir A. Identity-based cryptography and signature schemes. Advances in Cryptology, Proceedings of International Conference on Advances in Cryptology CRYPTO'84, Aug 19--22, 1984"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium.","author":"Liu D","key":"e_1_3_2_1_11_1","unstructured":"Liu D , Ning P. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks . Proceedings of the 10th Annual Network and Distributed System Security Symposium. Liu D, Ning P. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Proceedings of the 10th Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/15501320490522803"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352793.1352885"},{"key":"e_1_3_2_1_14_1","volume-title":"Aug 19--23","author":"Boneh D","year":"2001","unstructured":"Boneh D , Franklin M. Identity-based encryption from the Weil pairing Proceedings of International Conference on Advances in Cryptology (CRYPTO'1) , Aug 19--23 , 2001 , Santa Barbara, CA , USA. Berlin, Germany :Springer-Verlag, 2001:213--229 Boneh D, Franklin M. Identity-based encryption from the Weil pairing Proceedings of International Conference on Advances in Cryptology (CRYPTO'1), Aug 19--23, 2001, Santa Barbara, CA, USA. Berlin, Germany:Springer-Verlag, 2001:213--229"},{"key":"e_1_3_2_1_15_1","volume-title":"Wireless Communications:Principles&amp;Practice","author":"Rappaport","year":"1996","unstructured":"T Rappaport , Wireless Communications:Principles&amp;Practice . Englewood Cliffs, NJ : Prentice-Hall , 1996 T Rappaport, Wireless Communications:Principles&amp;Practice. Englewood Cliffs, NJ:Prentice-Hall, 1996"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:12Z","timestamp":1750250472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":16,"alternative-id":["10.1145\/1655925.1656026","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656026","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}