{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T05:10:02Z","timestamp":1748754602184,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811003554"},{"type":"electronic","value":"9789811003561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0356-1_50","type":"book-chapter","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T14:24:58Z","timestamp":1453127098000},"page":"474-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks"],"prefix":"10.1007","author":[{"given":"Zhenzhen","family":"Xie","sequence":"first","affiliation":[]},{"given":"Liang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kuo","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Jose, J., Princy, M., Jose, J.: PEPPDA: power efficient privacy preserving data aggregation for wireless sensor networks. In: 2013 International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), pp. 330\u2013336, March 2013","DOI":"10.1109\/ICE-CCN.2013.6528518"},{"issue":"5","key":"50_CR2","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/CC.2015.7112038","volume":"12","author":"X Jian","year":"2015","unstructured":"Jian, X., Geng, Y., Zhengyu, C., Qianqian, W.: A survey on the privacy-preserving data aggregation in wireless sensor networks. Commun. Chin. 12(5), 162\u2013180 (2015)","journal-title":"Commun. Chin."},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Hu, L., Shahabi, C.: Privacy assurance in mobile sensing networks: go beyond trusted servers. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMWorkshops), pp. 613\u2013619, March 2010","DOI":"10.1109\/PERCOMW.2010.5470509"},{"issue":"12","key":"50_CR4","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TMC.2013.150","volume":"13","author":"X Wang","year":"2014","unstructured":"Wang, X., Cheng, W., Mohapatra, P., Abdelzaher, T.: Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Trans. Mob. Comput. 13(12), 2777\u20132790 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"50_CR5","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719\u20131733 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"50_CR6","doi-asserted-by":"publisher","first-page":"21174","DOI":"10.3390\/s141121174","volume":"14","author":"Y Yao","year":"2014","unstructured":"Yao, Y., Liu, J., Xiong, N.N.: Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes. Sensors 14(11), 21174 (2014)","journal-title":"Sensors"},{"issue":"8","key":"50_CR7","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N Li","year":"2009","unstructured":"Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501\u20131514 (2009). Privacy and Security in Wireless Sensor and Ad Hoc Networks","journal-title":"Ad Hoc Netw."},{"key":"50_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.adhoc.2015.01.001","volume":"32","author":"JR Ward","year":"2015","unstructured":"Ward, J.R., Younis, M.: Increasing base station anonymity using distributed beamforming. Ad Hoc Netw. 32, 53\u201380 (2015). Internet of Things security and privacy: design methods and optimization","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"50_CR9","doi-asserted-by":"publisher","first-page":"5820","DOI":"10.3390\/s150305820","volume":"15","author":"A-S Abuzneid","year":"2015","unstructured":"Abuzneid, A.-S., Sobh, T., Faezipour, M., Mahmood, A., James, J.: Fortified anonymous communication protocol for location privacy in wsn: a modular approach. Sensors 15(3), 5820 (2015)","journal-title":"Sensors"},{"issue":"12","key":"50_CR10","doi-asserted-by":"publisher","first-page":"2999","DOI":"10.1002\/cpe.3242","volume":"27","author":"A Jhumka","year":"2015","unstructured":"Jhumka, A., Bradbury, M., Leeke, M.: Fake source-based source location privacy in wireless sensor networks. Concurrency Comput. Pract. Exp. 27(12), 2999\u20133020 (2015)","journal-title":"Concurrency Comput. Pract. Exp."},{"issue":"6","key":"50_CR11","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1109\/TMC.2014.2352253","volume":"14","author":"F Qiu","year":"2015","unstructured":"Qiu, F., Fan, W., Chen, G.: Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans. Mob. Comput. 14(6), 1287\u20131300 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"50_CR12","unstructured":"Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: a library in C\/C++ facilitating erasure coding for storage applications - Version 1.2. Technical report CS-08-627, University of Tennessee, August 2008"},{"issue":"5","key":"50_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MNET.2014.6915446","volume":"28","author":"H Wang","year":"2014","unstructured":"Wang, H., Zhang, Z., Lin, X., Fang, H.: Socialized WBANs in mobile sensing environments. IEEE Netw. 28(5), 91\u201395 (2014)","journal-title":"IEEE Netw."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0356-1_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:47:21Z","timestamp":1748753241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0356-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811003554","9789811003561"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0356-1_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}