{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:26:43Z","timestamp":1725560803267},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/avss.2011.6027314","type":"proceedings-article","created":{"date-parts":[[2011,10,3]],"date-time":"2011-10-03T15:34:13Z","timestamp":1317656053000},"page":"172-177","source":"Crossref","is-referenced-by-count":1,"title":["Efficiently secure image transmission against tampering in wireless visual sensor networks"],"prefix":"10.1109","author":[{"given":"Gowun","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Hyun S.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/MC.2002.1039518"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1218556.1218559"},{"key":"11","first-page":"419","author":"sbrusch","year":"2009","journal-title":"Security in RFID and Sensor Networks"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/TWC.2009.070769"},{"year":"2005","author":"campetep","journal-title":"Key distribution mechanisms for wireless sensor networks a survey","key":"3"},{"key":"2","article-title":"Key recovery attacks of practical complexity on AES variants with up to 10 rounds","author":"biryukov","year":"2010","journal-title":"ePrint Archive"},{"key":"1","article-title":"Malicious node detection in wireless sensor networks using weighted trust evaluation","author":"atakli","year":"0","journal-title":"The Symposium on Simulation of Systems Security 2008"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1023\/A:1016598314198"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/s11554-007-0048-7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/s11235-009-9235-0"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/UBICOMM.2009.27"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TCE.2010.5606357"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TNET.2009.2032910"},{"key":"8","first-page":"49","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"}],"event":{"name":"2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2011,8,30]]},"location":"Klagenfurt, Austria","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6022616\/6027273\/06027314.pdf?arnumber=6027314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:55:20Z","timestamp":1490086520000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6027314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/avss.2011.6027314","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}