{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:19:47Z","timestamp":1742915987889,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642179549"},{"type":"electronic","value":"9783642179556"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-17955-6_10","type":"book-chapter","created":{"date-parts":[[2011,1,16]],"date-time":"2011-01-16T20:29:00Z","timestamp":1295209740000},"page":"135-149","source":"Crossref","is-referenced-by-count":2,"title":["Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Atsuko","family":"Miyaji","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"278","volume-title":"CCS 2006","author":"H. Chan","year":"2006","unstructured":"Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006, pp. 278\u2013287. ACM, New York (2006)"},{"key":"10_CR2","first-page":"68","volume-title":"WiSec 2008","author":"K.B. Frikken","year":"2008","unstructured":"Frikken, K.B., Dougherty, J.A.: An efficient integrity-preserving scheme for hierarchical sensor aggregation. In: WiSec 2008, pp. 68\u201376. ACM, New York (2008)"},{"key":"10_CR3","first-page":"131","volume-title":"Proc. ACM SIGOPS Operating Systems","author":"S. Madden","year":"2002","unstructured":"Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Proc. ACM SIGOPS Operating Systems, pp. 131\u2013146. ACM, New York (2002)"},{"key":"10_CR4","first-page":"9","volume-title":"Proc. ACM SIGMOD Record","author":"Y. Yao","year":"2002","unstructured":"Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. In: Proc. ACM SIGMOD Record, vol.\u00a031, pp. 9\u201318. ACM, New York (2002)"},{"key":"10_CR5","first-page":"27","volume-title":"SAINT 2003","author":"L. Hu","year":"2003","unstructured":"Hu, L., Evans, D.: Secure aggregation for wireless networks. In: SAINT 2003, pp. 27\u201331. IEEE, Los Alamitos (2003)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-30474-6_10","volume-title":"High Performance Computing - HiPC 2004","author":"P. Jadia","year":"2004","unstructured":"Jadia, P., Mathuria, A.: Efficient secure aggregation in sensor networks. In: Boug\u00e9, L., Prasanna, V.K. (eds.) HiPC 2004. LNCS, vol.\u00a03296, pp. 40\u201349. Springer, Heidelberg (2004)"},{"key":"10_CR7","first-page":"255","volume-title":"SenSys 2003","author":"B. Przydatek","year":"2003","unstructured":"Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: SenSys 2003, pp. 255\u2013265. ACM, New York (2003)"},{"key":"10_CR8","first-page":"1435","volume-title":"GLOBECOM 2003","author":"W. Du","year":"2003","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.: A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks. In: GLOBECOM 2003, pp. 1435\u20131439. IEEE, Los Alamitos (2003)"},{"key":"10_CR9","first-page":"2175","volume-title":"GLOBECOM 2004","author":"A. Mahimkar","year":"2004","unstructured":"Mahimkar, A., Rappaport, T.S.: SecureDAV: a secure data aggregation and verification protocol for sensor networks. In: GLOBECOM 2004, pp. 2175\u20132179. IEEE, Los Alamitos (2004)"},{"key":"10_CR10","first-page":"356","volume-title":"MobiHoc 2006","author":"Y. Yang","year":"2006","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006, pp. 356\u2013367. ACM, New York (2006)"},{"key":"10_CR11","first-page":"433","volume-title":"DSN 2001","author":"I. Gupta","year":"2001","unstructured":"Gupta, I., Van Renesse, R., Birman, K.P.: Scalable fault-tolerant aggregation in large process groups. In: DSN 2001, pp. 433\u2013442. IEEE, Los Alamitos (2001)"},{"key":"10_CR12","first-page":"250","volume-title":"SenSys 2004","author":"S. Nath","year":"2004","unstructured":"Nath, S., Gibbons, P.B., Seshan, S., Anderson, Z.R.: Synopsis diffusion for robust aggregation in sensor networks. In: SenSys 2004, pp. 250\u2013262. ACM, New York (2004)"},{"key":"10_CR13","first-page":"348","volume-title":"IPSN 2005","author":"J.Y. Chen","year":"2005","unstructured":"Chen, J.Y., Pandurangan, G., Xu, D.: Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. In: IPSN 2005, pp. 348\u2013355. IEEE, Los Alamitos (2005)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1145\/1066157.1066191","volume-title":"Proc. 2005 ACM SIGMOD International Conference on Management of Data","author":"A. Manjhi","year":"2005","unstructured":"Manjhi, A., Nath, S., Gibbons, P.B.: Tributaries and deltas: efficient and robust aggregation in sensor network streams. In: Proc. 2005 ACM SIGMOD International Conference on Management of Data, pp. 287\u2013298. ACM, New York (2005)"},{"key":"10_CR15","first-page":"78","volume-title":"SASN 2004","author":"D. Wagner","year":"2004","unstructured":"Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004, pp. 78\u201387. ACM, New York (2004)"},{"key":"10_CR16","first-page":"1","volume-title":"NPSec 2007","author":"P. Haghani","year":"2007","unstructured":"Haghani, P., Papadimitratos, P., Poturalski, M., Aberer, K., Hubaux, J.P.: Efficient and robust secure aggregation for sensor networks. In: NPSec 2007, pp. 1\u20136. IEEE, Los Alamitos (2007)"},{"key":"10_CR17","first-page":"521","volume-title":"CCS 2008","author":"H. Chan","year":"2008","unstructured":"Chan, H., Perrig, A.: Efficient security primitives derived from a secure aggregation algorithm. In: CCS 2008, pp. 521\u2013534. ACM, New York (2008)"},{"key":"10_CR18","first-page":"179","volume-title":"PerCom 2008","author":"W. Zhang","year":"2008","unstructured":"Zhang, W., Wang, C., Feng, T.: GP2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data. In: PerCom 2008, pp. 179\u2013184. IEEE, Los Alamitos (2008)"},{"key":"10_CR19","first-page":"109","volume-title":"MOBIQUITOUS 2005","author":"C. Castelluccia","year":"2005","unstructured":"Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: MOBIQUITOUS 2005, pp. 109\u2013117. IEEE, Los Alamitos (2005)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Manulis, M., Schwenk, J.: Security model and framework for information aggregation in sensor networks. ACM Transactions on Sensor Networks (TOSN)\u00a05(2) (2009)","DOI":"10.1145\/1498915.1498919"},{"issue":"10","key":"10_CR21","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TMC.2006.144","volume":"5","author":"D. Westhoff","year":"2006","unstructured":"Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing\u00a05(10), 1417\u20131431 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10_CR22","first-page":"2045","volume-title":"INFOCOM 2007","author":"W. He","year":"2007","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: Privacy-preserving data aggregation in wireless sensor networks. In: INFOCOM 2007, pp. 2045\u20132053. IEEE, Los Alamitos (2007)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-74767-3_4","volume-title":"Frontiers of High Performance Computing and Networking ISPA 2007 Workshops","author":"S.Q. Ren","year":"2007","unstructured":"Ren, S.Q., Kim, D.S., Park, J.S.: A secure data aggregation scheme for wireless sensor networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds.) ISPA Workshops 2007. LNCS, vol.\u00a04743, pp. 32\u201340. Springer, Heidelberg (2007)"},{"key":"10_CR24","first-page":"122","volume-title":"IEEE S&P","author":"R.C. Merkle","year":"1980","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE S&P, pp. 122\u2013134. IEEE, Los Alamitos (1980)"},{"key":"10_CR25","first-page":"56","volume-title":"IEEE S&P","author":"A. Perrig","year":"2000","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE S&P, pp. 56\u201373. IEEE, Los Alamitos (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17955-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:47:10Z","timestamp":1558295230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17955-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642179549","9783642179556"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17955-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}