{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:49Z","timestamp":1750308829907,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600321"},{"type":"electronic","value":"9783319600338"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60033-8_19","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T16:18:42Z","timestamp":1495815522000},"page":"210-219","source":"Crossref","is-referenced-by-count":3,"title":["Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Kai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lifei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"crossref","first-page":"2874","DOI":"10.3390\/s120302874","volume":"12","author":"C D\u2019Este","year":"2012","unstructured":"D\u2019Este, C., De Souza, P., Sharman, C., Allen, S.: Relocatable, automated cost-benefit analysis for marine sensor network design. Sensors 12(3), 2874\u20132898 (2012)","journal-title":"Sensors"},{"unstructured":"Wang, Z., Song, H., Watkins, D.W., Ong, K.G., Xue, P., Yang, Q., Shi, X.: Cyber-physical systems for water sustainability: challenges and opportunities. IEEE Commun. Mag. 53(5), 216\u2013222 (2015)","key":"19_CR2"},{"doi-asserted-by":"crossref","unstructured":"Zhang, A., Yang, L., Zhang, S., Yu, J., Shu, Y.: Marine vehicle sensor network architecture and protocol designs for ocean observation. Sensors 12(1), 373\u2013390 (2012)","key":"19_CR3","DOI":"10.3390\/s120100373"},{"doi-asserted-by":"crossref","unstructured":"Pengfei, H., Xing, K., Cheng, X., Wei, H., Zhu, H.: Information leaks out: attacks and countermeasures on compressive data gathering in wireless sensor networks. In: International Conference on Computer Communications (INFOCOM), pp. 1258\u20131266 (2014)","key":"19_CR4","DOI":"10.1109\/INFOCOM.2014.6848058"},{"key":"19_CR5","first-page":"2015","volume":"1\u201313","author":"D Huang","year":"2015","unstructured":"Huang, D., Zhao, D., Wei, L., Wang, Z., Yanling, D.: Modeling and analysis in marine big data: advances and challenges. Math. Probl. Eng. 1\u201313, 2015 (2015)","journal-title":"Math. Probl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg (2011)","key":"19_CR6","DOI":"10.6028\/NIST.SP.800-145"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-22792-9_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"S Benabbas","year":"2011","unstructured":"Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111\u2013131. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22792-9_7"},{"doi-asserted-by":"crossref","unstructured":"Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM Sigsac Conference on Computer and Communications Security, pp. 863\u2013874 (2013)","key":"19_CR8","DOI":"10.1145\/2508859.2516681"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465\u2013482. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_25"},{"doi-asserted-by":"crossref","unstructured":"Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501\u2013512 (2012)","key":"19_CR10","DOI":"10.1145\/2382196.2382250"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-14165-2_14","volume-title":"Automata, Languages and Programming","author":"B Applebaum","year":"2010","unstructured":"Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152\u2013163. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14165-2_14"},{"issue":"99","key":"19_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TII.2016.2573762","volume":"PP","author":"Y Jiang","year":"2016","unstructured":"Jiang, Y., Song, H., Wang, R., Ming, G., Sun, J., Sha, L.: Data-centered runtime verification of wireless medical cyber-physical system. IEEE Trans. Industr. Inform. PP(99), 1 (2016). doi: 10.1109\/TII.2016.2573762","journal-title":"IEEE Trans. Industr. Inform."},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-28914-9_24","volume-title":"Theory of Cryptography","author":"B Parno","year":"2012","unstructured":"Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422\u2013439. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28914-9_24"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-642-14623-7_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"K-M Chung","year":"2010","unstructured":"Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483\u2013501. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_26"},{"unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Technion-Israel Institute of Technology, Faculty of Computer Science (1996)","key":"19_CR15"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-01957-9_11","volume-title":"Applied Cryptography and Network Security","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168\u2013185. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01957-9_11"},{"unstructured":"Giry, D.: Bluekrypt. https:\/\/www.keylength.com\/en\/","key":"19_CR17"},{"unstructured":"Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptograph. Eng. 3(2), 111\u2013128 (2013)","key":"19_CR18"},{"unstructured":"Zhang, F.: http:\/\/student.seas.gwu.edu\/~zfwise\/crypto . Technical report","key":"19_CR19"},{"issue":"5","key":"19_CR20","first-page":"1234","volume":"84","author":"A Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 84(5), 1234\u20131243 (2001)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60033-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:31:41Z","timestamp":1750278701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60033-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600321","9783319600338"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60033-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}