{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:21:04Z","timestamp":1740028864489,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T00:00:00Z","timestamp":1270598400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1007\/s11432-010-0096-7","type":"journal-article","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T08:36:52Z","timestamp":1270629412000},"page":"964-979","source":"Crossref","is-referenced-by-count":7,"title":["Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks"],"prefix":"10.1007","volume":"53","author":[{"given":"Wei","family":"Ren","sequence":"first","affiliation":[]},{"given":"Yi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,4,7]]},"reference":[{"key":"96_CR1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2004.1296538","volume":"21","author":"B. Thuraisingham","year":"2004","unstructured":"Thuraisingham B. Secure sensor information management and mining. Signal Process Mag IEEE, 2004, 21: 14\u201319","journal-title":"Signal Process Mag IEEE"},{"key":"96_CR2","unstructured":"Pietro R D, Mancini L V, Soriente C, et al. Catch me (if you can): Data survival in unattended sensor networks. In: Proc. of 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201908), Hong Kong, China, 2008. 185\u2013194"},{"key":"96_CR3","unstructured":"Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks. In: Proc. of the Third Biennial Conference on Innovative Data Systems Research (CIDR\u201907), Asilomar, CA, 2007. 22\u201331"},{"key":"96_CR4","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1016\/j.adhoc.2006.05.004","volume":"5","author":"J. Girao","year":"2007","unstructured":"Girao J, Westhoff D, Mykletun E, et al. Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks, Elesevier, 2007, 5: 1073\u20131089","journal-title":"Ad Hoc Networks"},{"key":"96_CR5","doi-asserted-by":"crossref","unstructured":"Zeinalipour-Yazti D, Kalogeraki V, Gunopulos D, et al. Towards in-situ data storage in sensor databases. In: Proc. of 10th Panhellenic Conference on Informatics (PTI\u201905), LNCS 3746, Volos Greece, 2005. 36\u201346","DOI":"10.1007\/11573036_4"},{"key":"96_CR6","doi-asserted-by":"crossref","unstructured":"Osrovsky R, Yung M. How to withsand mobile virus attack. In: Proc. of PODC, Montreal, Quebec, Canada, 1991. 51\u201359","DOI":"10.1145\/112600.112605"},{"key":"96_CR7","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MNET.2009.4804335","volume":"23","author":"D. Ma","year":"2009","unstructured":"Ma D, Soriente C, Tsudik G. New adversary and new threats: Security in unattended sensor networks. IEEE Network, 2009, 23: 43\u201348","journal-title":"IEEE Network"},{"key":"96_CR8","doi-asserted-by":"crossref","unstructured":"Ma D, Tsudik G. Forward-secure sequential aggregate authentication. In: IEEE Symposium on Security and Privacy (IEEE S&P\u201907), Oakland, May 2007. 86\u201391","DOI":"10.1109\/SP.2007.18"},{"key":"96_CR9","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/1084779.1084780","volume":"1","author":"D. Ganesan","year":"2005","unstructured":"Ganesan D, Greenstein B, Estrin D, et al. Multiresolution storage and search in sensor networks. ACM Trans Stor, 2005, 1: 277\u2013315","journal-title":"ACM Trans Stor"},{"key":"96_CR10","doi-asserted-by":"crossref","unstructured":"Mathur G, Desnoyers P, Ganesan D, et al. Ultra-low power data storage for sensor networks. In: Proc. of the Fifth International Conference on Information Processing in Sensor Networks (IPSN\u201906), Nashville, Tennessee, USA, 2006. 374\u2013381","DOI":"10.1145\/1127777.1127833"},{"key":"96_CR11","unstructured":"Banerjee A, Mitra A, Naijar W, et al. Rise-co-s: High performance sensor storage and co-processing architecture. In: Proc. of Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Natowkrs, (SECON\u201905), Santa Clara, California, 2005. 1\u201312"},{"key":"96_CR12","doi-asserted-by":"crossref","unstructured":"Blundo C, Santix A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences. In: Proc. of CRYPTO\u201992, Santa Barbara, California, USA, 1992. 471\u2013486","DOI":"10.1007\/3-540-48071-4_33"},{"key":"96_CR13","doi-asserted-by":"crossref","unstructured":"Bhatnagar N, Miller E L. Designing a secure reliable file system for sensor networks. In: Proc. of the 2007 ACM Workshop on Storage Security and Survivability (Storage\u201907), Alexandria, Virginia, 2007","DOI":"10.1145\/1314313.1314319"},{"key":"96_CR14","doi-asserted-by":"crossref","unstructured":"Girod L, Lukac M, Trifa V, et al. The design and implementation of a self-calibrating distributed acoustic sensing platform. In: Proc. of ACM SenSys\u201906, Baulder Colorado, USA, 2006","DOI":"10.1145\/1182807.1182815"},{"key":"96_CR15","unstructured":"Inel corporation. Intel mote 2. http:\/\/www.intel.com\/research\/ ."},{"key":"96_CR16","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Comm ACM, 1979, 22: 612\u2013613","journal-title":"Comm ACM"},{"key":"96_CR17","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"S. Reed","year":"1960","unstructured":"Reed S, Solomon G. Polynomial codes over certain finite. J Soc Indust Appl Math, 1960, 8: 300\u2013304","journal-title":"J Soc Indust Appl Math"},{"key":"96_CR18","unstructured":"Lou W, Liu W, Fang Y. Spread: Enhancing data confidentiality in mobile and hoc networks. In: Proc. of IEEE INFOCOM\u201904, Hong Kong, China, 2004. 2404\u20132413"},{"key":"96_CR19","doi-asserted-by":"crossref","unstructured":"Cachin C, Tessaro S. Optimal resilience for erasure-coded byzantine distributed storage. In: Proc. of Dependable Systems and Networks (DSN\u201906), Washington, DC, USA, 2006. 115\u2013124","DOI":"10.1109\/DSN.2006.56"},{"key":"96_CR20","doi-asserted-by":"crossref","unstructured":"Aguilera M K, Janakiraman R, Xu L. Using erasure codes efficiently for storage in a distributed systems. In: Proc. of DSN\u201905, Palo Alto, CA, USA, 2005. 336\u2013345","DOI":"10.1109\/DSN.2005.96"},{"key":"96_CR21","unstructured":"Belenkiy M. Disjunctive multi-level secret sharing. Cryptology ePrint Archive, Report 2008\/018, 2008, http:\/\/eprint.iacr.org\/"},{"key":"96_CR22","unstructured":"Benaloh J. Secret sharing homomorphisms: keeping shares of a secret secret. In: Proc. of Crypto\u201986, Santa Barbara, California, USA, 1987. 251\u2013260"},{"key":"96_CR23","unstructured":"Plank J S. Fast galois field arithmetic library in c\/c++. Tech. Report UT-CS-07-593, 2007"},{"key":"96_CR24","unstructured":"Greenan K M, Miller E L, Schwarz T. Analysis and construction of galois fields for efficient storage reliability. Tech. Report Number SSRC-07-09, UCSC, Storage Systems Research Center, August 2007"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0096-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-0096-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0096-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T21:47:05Z","timestamp":1740001625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-0096-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,7]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["96"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-0096-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2010,4,7]]}}}