{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:54Z","timestamp":1742913954425,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813342132"},{"type":"electronic","value":"9789813342149"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-33-4214-9_15","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:26:34Z","timestamp":1606195594000},"page":"197-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving and Secure Average Consensus"],"prefix":"10.1007","author":[{"given":"Yalian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jiaqi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinbiao","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/JPROC.2006.887293","volume":"95","author":"R Olfati-Saber","year":"2007","unstructured":"Olfati-Saber, R., Fax, J.A., Murray, R.M.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215\u2013233 (2007)","journal-title":"Proc. IEEE"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TII.2012.2219061","volume":"9","author":"YC Cao","year":"2013","unstructured":"Cao, Y.C., Yu, W.W., Ren, W., Chen, G.R.: An overview of recent progress in the study of distributed multi-agent coordination. IEEE Trans. Ind. Inform. 9(1), 427\u2013438 (2013)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"15_CR3","unstructured":"Olfati-Saber, R., Shamma, J.S.: Consensus filters for sensor networks and distributed sensor fusion. In: Proceedings of the 44th IEEE Conference on Decision and Control\/European Control Conference (CCDECC), pp. 6698\u20136703 (2005)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Zhao, C., Chen, J., He, J., Cheng, P.: Privacy-preserving consensus-based energy management in smart grids. In: IEEE Transactions on Signal Processing, vol. 66, no. 23, pp. 6162\u20136176 (2018)","DOI":"10.1109\/TSP.2018.2872817"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"O\u2019Connor, M., Kleijn, W.B.: Finite approximate consensus for privacy in distributed sensor networks. In: 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 75\u201377 (2019)","DOI":"10.1109\/PDCAT46702.2019.00025"},{"issue":"9","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/TAC.2004.834113","volume":"49","author":"R Olfati-Saber","year":"2004","unstructured":"Olfati-Saber, R., Murray, R.M.: Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Automatic Control 49(9), 1520\u20131533 (2004)","journal-title":"IEEE Trans. Automatic Control"},{"key":"15_CR7","unstructured":"Wei, X., Yu, W., Wang, H., Yao, Y., Mei, F.: An observer-basedfixed-time consensus control for second-order multi-agent systems with disturbances. IEEE Trans. Circuits Syst. II Exp. Briefs, 66(2), 247\u2013251 (2019)"},{"key":"15_CR8","unstructured":"Hu, H., Wen, G., Yu, W., Xuan, Q., Chen, G.: Swarming behavior of multiple euler-lagrange systems with cooperation-competition interactions: an auxiliary system approach. IEEE Trans. Neural Netw. Learn. Syst, vol. 29(11), 5726\u20135737 (2018)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Z., Mitra, S, Dullerud, G.: Differentially private iterative synchronous consensus. In: Proceedings CCS Workshop Privacy Electron. Soc. (WPES), Raleigh, NC, USA, July 2012","DOI":"10.1145\/2381966.2381978"},{"issue":"7","key":"15_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.automatica.2017.03.016","volume":"81","author":"E Nozari","year":"2017","unstructured":"Nozari, E., Tallapragada, P., Cortes, J.: Differentially private average consensus: obstructions, trade-offs, and optimal algorithm design. Automatica 81(7), 221\u2013231 (2017)","journal-title":"Automatica"},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TAC.2016.2564339","volume":"62","author":"Y Mo","year":"2017","unstructured":"Mo, Y., Murray, R.M.: Privacy preserving average consensus. IEEE Trans. Autom. Control 62(2), 753\u2013765 (2017)","journal-title":"IEEE Trans. Autom. Control"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Yin, T., Lv, Y., Yu, W.: Accurate privacy preserving average consensus. IEEE Trans. Circ. Syst. II Express Briefs, 67(4) 690\u2013694 (2020)","DOI":"10.1109\/TCSII.2019.2918709"},{"issue":"10","key":"15_CR14","doi-asserted-by":"publisher","first-page":"4035","DOI":"10.1109\/TAC.2019.2890887","volume":"64","author":"M Ruan","year":"2019","unstructured":"Ruan, M., Gao, H., Wang, Y.: Secure and privacy-preserving consensus. IEEE Trans. Automatic Control 64(10), 4035\u20134049 (2019)","journal-title":"IEEE Trans. Automatic Control"},{"issue":"6","key":"15_CR15","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Vehicular Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_22"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"J Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410\u2013424. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052252"},{"key":"15_CR19","unstructured":"Popescu, C.: An efficient ID-based group signature scheme. Studia Univ. Babes-Bolyai, Informatica, vol. XLVII, no. 2, pp. 29\u201338 (2002)"}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4214-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:34:21Z","timestamp":1606196061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4214-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813342132","9789813342149"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4214-9_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CWSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Conference on Wireless Sensor Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dunhuang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cwsn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cwsn2020.aconf.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3\/5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}