{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:19:41Z","timestamp":1648772381141},"reference-count":11,"publisher":"International Academy Publishing (IAP)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.9.11.2530-2537","type":"journal-article","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T15:29:33Z","timestamp":1417620573000},"source":"Crossref","is-referenced-by-count":0,"title":["A Time-Based Pre-distribution Shared Key Pool Design"],"prefix":"10.17706","volume":"9","author":[{"given":"Linfeng","family":"Wei","sequence":"first","affiliation":[]},{"given":"Caiting","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Guoxiang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Meixiu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qingliang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,11,1]]},"reference":[{"key":"ref1","first-page":"12","volume-title":"A Survey on the Key Management Schemes for Wireless Sensor Networks","author":"Min","year":"2008","unstructured":"[1] LI Min, YIN Jianping,WU Yongan, CHENG Jieren. A Survey on the Key Management Schemes for Wireless Sensor Networks [J]. Computer Engineering & Science. 2008, 12."},{"issue":"13","key":"ref2","first-page":"77","article-title":"Survey on key management of wireless sensor networks.","volume":"47","author":"Bo","year":"2011","unstructured":"[2] MI Bo, CAO Jianqiu, DUAN Shukai et al.Survey on key management of wireless sensor networks.Computer Engineering and Applications, 2011, 47(13):77-82.","journal-title":"Computer Engineering and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2009.00030"},{"issue":"2","key":"ref4","first-page":"30","article-title":"Lightweight security architecture design for wireless sensor network","volume":"33","author":"Chao","year":"2012","unstructured":"[4] WANG Chao, HU Guang-yue, ZHANG Huan-guo. Lightweight security architecture design for wireless sensor network [J]. Journal on Communications. 2012, 33(2): 30-35.","journal-title":"J Commun","ISSN":"http:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"11","key":"ref5","first-page":"161","article-title":"Key Distribution Scheme for WSN Based on Hash Function","volume":"36","author":"Wang-sheng","year":"2010","unstructured":"[6] FANG Wang-sheng, ZHANG Tao, CHEN Kang. Key Distribution Scheme for WSN Based on Hash Function [J]. Computer Engineering, 2010, 36(11): 161-163.","journal-title":"Computer Engineering"},{"issue":"4","key":"ref6","first-page":"527","article-title":"A Practical Hierarchical Key Management Scheme Based on One-Way Hash Function","volume":"44","author":"Xinhui","year":"2008","unstructured":"[7] HAN Xinhui, LONG Qin, SI Duanfeng et al. A Practical Hierarchical Key Management Scheme Based on One-Way Hash Function [J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2008, 44(4): 527-536.","journal-title":"Acta Scientiarum Naturalium Universitatis Pekinensis"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03457"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.6.1241-1247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.010413.120732"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.5.887-893"},{"issue":"6","key":"ref11","first-page":"1042","article-title":"HE Z. Accelerometer based gesture recognition using fusion features and SVM","volume":"6","year":"2011","unstructured":"[16] HE Z. Accelerometer based gesture recognition using fusion features and SVM[J]. Journal of Software, 2011, 6(6): 1042-1049","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:15:15Z","timestamp":1442330115000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/12817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,1]]},"references-count":11,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2014,11,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.9.11.2530-2537","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,11,1]]}}}