{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:06:20Z","timestamp":1765231580236,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/glocom.2004.1378395","type":"proceedings-article","created":{"date-parts":[[2005,4,5]],"date-time":"2005-04-05T13:41:25Z","timestamp":1112708485000},"page":"2175-2179","source":"Crossref","is-referenced-by-count":64,"title":["SecureDAV: a secure data aggregation and verification protocol for sensor networks"],"prefix":"10.1109","volume":"4","author":[{"given":"A.","family":"Mahimkar","sequence":"first","affiliation":[]},{"given":"T.S.","family":"Rappaport","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200685"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"ref12","article-title":"Securing ad hoc networks","volume":"13","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"ref13","first-page":"251","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"0","journal-title":"ICNP 2001"},{"key":"ref14","article-title":"Secure Distributed Key Generation for Discrete-Log Based Cryptosystems","author":"gennaro","year":"0","journal-title":"EUROCRYPT'99"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_47"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8592-7","article-title":"A course in number theory and cryptography","author":"koblitz","year":"1994"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"ref5","first-page":"197","article-title":"Random Key Predistribution Schemes for Sensor Networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"ref2","article-title":"Secure aggregation for wireless networks","author":"hu","year":"2003","journal-title":"Workshop on Security and Assurance in Ad Hoc Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"ref20","article-title":"Cryto for Tiny Objects","author":"malan","year":"2004","journal-title":"Harvard University Technical Report"}],"event":{"name":"IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.","acronym":"GLOCOM-04","location":"Dallas, TX, USA"},"container-title":["IEEE Global Telecommunications Conference, 2004. GLOBECOM '04."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9481\/30080\/01378395.pdf?arnumber=1378395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T18:00:34Z","timestamp":1497636034000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1378395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2004.1378395","relation":{},"subject":[]}}