{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:14:13Z","timestamp":1725516853375},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540794981"},{"type":"electronic","value":"9783540794998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79499-8_8","type":"book-chapter","created":{"date-parts":[[2008,8,16]],"date-time":"2008-08-16T16:35:36Z","timestamp":1218904536000},"page":"81-92","source":"Crossref","is-referenced-by-count":9,"title":["A Key Predistribution Scheme Based on 3-Designs"],"prefix":"10.1007","author":[{"given":"Junwu","family":"Dong","sequence":"first","affiliation":[]},{"given":"Dingyi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Xueli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.B.: A key\u2013management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACMCCS (2002)","DOI":"10.1145\/586110.586117"},{"key":"8_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy (2003)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varsheney, P.K.: A pairwise key predistribution scheme for wireless sensors. In: Proceeding of the 10th ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 42\u201351 (2003)","DOI":"10.1145\/948117.948118"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACMCCS (2003)","DOI":"10.1145\/948109.948119"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"\u00c7amtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. Technical Report TR\u201304\u201310, RPI Dept. of Computer Science (April 2004)","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","first-page":"294","volume-title":"Selected Areas in Cryptography","author":"J. Lee","year":"2004","unstructured":"Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for sonsor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 294\u2013307. Springer, Heidelberg (2004)"},{"key":"8_CR7","unstructured":"Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Computing and Networking Conference (WCNC 2005), New Orleans, LA, USA (2005)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography","author":"R. Wei","year":"2004","unstructured":"Wei, R., Wu, J.: Product construction of key distribution schemes for network. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, Springer, Heidelberg (2004)"},{"key":"8_CR9","unstructured":"Pei, D., Dong, J., Rong, C.: A novel key pre-distribution scheme for wireless distributed sensor networks (preprint)"},{"volume-title":"Combinatorics of experimental design","year":"1987","author":"A.P. Street","key":"8_CR10","unstructured":"Street, A.P., Street, D.J.: Combinatorics of experimental design. Clarendon Press, Oxford (1987)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Pei, D.: Authentication codes and combinatorial designs. Chapman & Hall \/ CRC (2006)","DOI":"10.1201\/9781420003185"},{"key":"8_CR12","unstructured":"Hua, L.K., Wan, Z.X.: Classical groups. Shanghai Science and Technology Press (1963)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79499-8_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:19:25Z","timestamp":1606184365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79499-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540794981","9783540794998"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79499-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}