{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:33Z","timestamp":1725564633229},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_37","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"258-266","source":"Crossref","is-referenced-by-count":0,"title":["Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Paresh","family":"Solanki","sequence":"first","affiliation":[]},{"given":"Gaurang","family":"Raval","sequence":"additional","affiliation":[]},{"given":"Srikant","family":"Pradhan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","volume-title":"Secure data aggregation in wireless sensor networks: A comprehensive overview","author":"S. Ozdemir","year":"2009","unstructured":"Ozdemir, S., Yang, X.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier B.V., Amsterdam (2009) doi:10.1016\/j.comnet.2009.02.023"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Alzaid, H., Ernest, F., Juan, G.N.: Secure Data Aggregation in Wireless Sensor Network: A Survey. In: ACSC 2008, Australia (January 2008)","DOI":"10.1109\/PDCAT.2008.52"},{"key":"37_CR3","unstructured":"Pranay, T.: Data Aggregation in Cluster-based Wireless Sensor Networks. Thesis, IIIT Allhabad (July 2008)"},{"key":"37_CR4","unstructured":"Yingpeng, S., Hong, S.: Secure data aggregation in wireless sensor networks: a survey. In: Seventh International Conference PDCAT 2006 (December 2006)"},{"issue":"4","key":"37_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/COMST.2006.283821","volume":"8","author":"R. Ramesh","year":"2006","unstructured":"Ramesh, R., Pramod, K.V.: Data aggregation techniques in sensor networks: A survey. IEEE Communications Surveys & Tutorials\u00a08(4), 48\u201363 (2006)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Ozdemir, S.: Concealed Data Aggregation in Heterogeneous sensor networks using privacy homomorphism. In: ICPS 2007: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165\u2013168 (2007)","DOI":"10.1109\/PERSER.2007.4283909"},{"key":"37_CR7","unstructured":"Joao, G., Dirk, W., Markus, S.: CDA:concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: 40th International Conference on Communications, IEEE ICC 2005 (May 2005)"},{"key":"37_CR8","unstructured":"Levent, E., Johan, H.Y.: Implementation of Domingo Ferrers a new privacy homomorphism in securing wireless sensor networks, WSN (2007)"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Castelluccia, Aldar, C., Gene, T.: Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Transactions on Sensor Networks\u00a05(3) (May 2009) Article 20","DOI":"10.1145\/1525856.1525858"},{"key":"37_CR10","unstructured":"Barr, R., Hass, Z.J., Van Renesse, R.: JiST: Embedding Simulation Time into a Virtual Machine. In: 5th EUROSIM Congress on Modeling and Simulation, Paris, France (September 2004)"},{"key":"37_CR11","unstructured":"Barr, R., Zygmunt, J.H., Van Renesse, R.: JiST: An efficient approach to simulation using virtual machines. Software Practice and experience, 1\u20137 (2004)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Barr, R.: SWANSScalable Wireless Ad hoc Network Simulator. User Guide (March 19, 2004)","DOI":"10.1201\/9780203323687.ch19"},{"key":"37_CR13","unstructured":"Trishla, S., Imad, M., Ali, H., Ahmed, B.: Implementation of an Energy Model for JiST\/SWANS Wireless Network Simulator. In: Sixth International Conference, ICN 2007 (April 2007)"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:40:04Z","timestamp":1606185604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}