{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:40:10Z","timestamp":1756237210373,"version":"3.44.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/bmei.2012.6513071","type":"proceedings-article","created":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T17:39:19Z","timestamp":1368207559000},"page":"1499-1502","source":"Crossref","is-referenced-by-count":0,"title":["Recoverable concealed data aggregation for privacy preserving in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Dapeng","family":"Wu","sequence":"first","affiliation":[{"name":"Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Jichao","family":"Tang","sequence":"additional","affiliation":[{"name":"Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Qingwen","family":"Sun","sequence":"additional","affiliation":[{"name":"Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Ruyan","family":"Wang","sequence":"additional","affiliation":[{"name":"Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing, China"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.03.003"},{"key":"1","first-page":"31","article-title":"Survey on data aggregation of wireless sensor networks","volume":"37","author":"jian","year":"2010","journal-title":"Computer Science"},{"key":"7","first-page":"985","article-title":"A privacy enhanced data aggregation model","author":"qin ren","year":"2010","journal-title":"Proc IEEE Int Conf Computer and Information Technology"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689244"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3390\/s100504577"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753645"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"}],"event":{"name":"2012 5th International Conference on Biomedical Engineering and Informatics (BMEI)","start":{"date-parts":[[2012,10,16]]},"location":"Chongqing, China","end":{"date-parts":[[2012,10,18]]}},"container-title":["2012 5th International Conference on BioMedical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6507003\/6512872\/06513071.pdf?arnumber=6513071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:07:08Z","timestamp":1756235228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6513071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/bmei.2012.6513071","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}