{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:26:38Z","timestamp":1773321998640,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icc.2005.1494953","type":"proceedings-article","created":{"date-parts":[[2005,8,16]],"date-time":"2005-08-16T15:17:27Z","timestamp":1124205447000},"page":"3044-3049","source":"Crossref","is-referenced-by-count":108,"title":["CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks"],"prefix":"10.1109","volume":"5","author":[{"given":"J.","family":"Girao","sequence":"first","affiliation":[]},{"given":"D.","family":"Westhoff","sequence":"additional","affiliation":[]},{"given":"M.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref12","first-page":"208","article-title":"A new Public-Key Cryptosystem as Secure as Factoring","author":"okamoto","year":"1998","journal-title":"Advances in Cryptology - EUROCRYPT'98"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/10958513_18","article-title":"Cryptanalysis of an Algebraic Privacy Homomorphism","author":"wagner","year":"2003","journal-title":"Proceedings of the 6th Information Security Conference (ISC 09)"},{"key":"ref14","first-page":"73","article-title":"Zero-Common Knowledge Authentication for Pervasive Networks","author":"weimerskirch","year":"2003","journal-title":"10th Selected Areas in Cryptography SAC'03"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986864"},{"key":"ref16","article-title":"Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis","author":"weimerskirch","year":"2004","journal-title":"Sensor Network Operations IEEE Press"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"ref3","first-page":"40","article-title":"MICA, The Commercialization of Microsensor Motes","volume":"19","author":"horton","year":"2002","journal-title":"SENSORS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref5","article-title":"The TESLA Broadcast Authentication Protocol","author":"perrig","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"ref8","first-page":"471","article-title":"A provably secure additive and multiplicative privacy homomorphism","author":"domingo-ferrer","year":"2002","journal-title":"Information Security Conference LNCS 2433"},{"key":"ref7","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00009-X"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/941322.941324"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941372"}],"event":{"name":"IEEE International Conference on Communications, 2005. ICC 2005. 2005","location":"Seoul, Korea"},"container-title":["IEEE International Conference on Communications, 2005. ICC 2005. 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9996\/32113\/01494953.pdf?arnumber=1494953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T01:55:21Z","timestamp":1586397321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1494953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2005.1494953","relation":{},"subject":[]}}