{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:47Z","timestamp":1725559007166},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766591","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"751-755","source":"Crossref","is-referenced-by-count":1,"title":["ACP: Anonymous communication protocol fo wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Pengjun","family":"Pan","sequence":"first","affiliation":[]},{"given":"Rajendra V.","family":"Boppana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380568"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"journal-title":"Document Part Number 6020&#x2013;0060&#x2013;04 Rev A","article-title":"MICAz wireless measurement system","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.11"},{"article-title":"Low-Power, Secure Routing for MICA2 Mote","year":"2004","author":"duncan","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.005"},{"key":"ref3","first-page":"8","article-title":"Preserving source location privacy in monitoring-based wireless sensor networks","author":"xi","year":"2006","journal-title":"Parallel and Distributed Processing Symposium 2006 IPDPS 2006 20th International"},{"key":"ref6","article-title":"Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks","author":"boppana","year":"2010","journal-title":"Tech Rep CS-TR-2010&#x2013;007"},{"key":"ref5","first-page":"194","article-title":"Protecting location privacy through path con-fusion","author":"hoh","year":"2006","journal-title":"Security and Privacy for Emerging Areas in Communications Networks 2005 SecureComm 2005 First International Conference on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440887"},{"key":"ref7","article-title":"The mote revolution: Low power wireless sensor network devices","author":"polastre","year":"2004","journal-title":"HotChips'04"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HIPC.2009.5433210"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766591.pdf?arnumber=5766591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:29:11Z","timestamp":1490074151000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766591","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}