{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:49:58Z","timestamp":1725490198716},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/euc.2008.104","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T21:04:55Z","timestamp":1232485495000},"page":"306-311","source":"Crossref","is-referenced-by-count":0,"title":["Securing Wireless Sensor Networks Using Cluster Reformations"],"prefix":"10.1109","author":[{"given":"Gicheol","family":"Wang","sequence":"first","affiliation":[]},{"given":"Deokjai","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Daewook","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636204"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2007.135"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.08.012"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.106"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.260"},{"key":"1","article-title":"random key predistribution schemes for distributed sensor networks","author":"chan","year":"2003","journal-title":"Proc IEEE Symp on Security and Privacy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015697.38671.ec"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2006.250468"},{"key":"6","first-page":"41","article-title":"a key management scheme for distributed sensor networks","author":"eschenauer","year":"2002","journal-title":"Proc of 9th ACM Conf Computer and Communication Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080798"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2003.1214142"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632659"}],"event":{"name":"2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)","start":{"date-parts":[[2008,12,17]]},"location":"Shanghai, China","end":{"date-parts":[[2008,12,20]]}},"container-title":["2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4755182\/4755183\/04755244.pdf?arnumber=4755244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:43:44Z","timestamp":1489765424000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4755244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/euc.2008.104","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}