{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:46Z","timestamp":1730209906947,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/comsnets.2015.7098719","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T10:41:46Z","timestamp":1430822506000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNs"],"prefix":"10.1109","author":[{"given":"Suraj","family":"Verma","sequence":"first","affiliation":[]},{"given":"Prashant","family":"Pillai","sequence":"additional","affiliation":[]},{"given":"Yim Fun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.03.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref14","first-page":"471","article-title":"A Provably Secure Additive and Multiplicative Privacy Homomorphism","author":"ferrer","year":"2002","journal-title":"Proc Information Security Conf (ISC '02)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494953"},{"key":"ref16","article-title":"On Concealed Data Aggregation for Wireless Sensor Networks","author":"peter","year":"2007","journal-title":"Proc Fourth IEEE Consumer Comm and Networking Conf (CCNC)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.56"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref4","article-title":"Evolution of wireless sensor networks towards the internet of things: A survey","author":"mainetti","year":"2011","journal-title":"19th International Conference on Software Telecommunications and Computer Networks (SoftCOM)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.08.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.023"},{"key":"ref8","first-page":"41","article-title":"A Survey of Homomorphic Encryption for Nonspecialists","volume":"1","author":"fontaine","year":"2009","journal-title":"EURASIP Journal on Information Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2013.6666716"},{"key":"ref2","article-title":"Integrating Wireless Sensor Networks with the Web","author":"colitti","year":"2011","journal-title":"IP+SN"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"}],"event":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2015,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 7th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7090755\/7098633\/07098719.pdf?arnumber=7098719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:48:58Z","timestamp":1490366938000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7098719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2015.7098719","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}