{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:11:03Z","timestamp":1729678263086,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199430","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-5","source":"Crossref","is-referenced-by-count":15,"title":["Routing-Based Source-Location Privacy in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"J.","family":"Ren","sequence":"first","affiliation":[]},{"given":"Y.","family":"Li","sequence":"additional","affiliation":[]},{"given":"T.","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1020"},{"key":"22","first-page":"2685","article-title":"tps: a time-based positioning scheme for outdoor wireless sensor networks","volume":"4","author":"cheng","year":"2004","journal-title":"INFOCOM 2004 Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies"},{"key":"17","first-page":"524","article-title":"pike: peer intermediaries for key establishment in sensor networks","volume":"1","author":"chan","year":"2005","journal-title":"INFOCOM 2005 24th Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings IEEE"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/381677.381696","article-title":"spins: security protocols for sensor networks","author":"perrig","year":"2001","journal-title":"Seventh Annual International Conference on Mobile Computing and Networking (MobiCom"},{"key":"15","first-page":"599","article-title":"enhancing source-location privacy in sensor network routing","author":"kamat","year":"2005","journal-title":"Distributed Computing Systems 2005 ICDCS 2005 Proceedings 25th IEEE International Conference on"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311934"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"article-title":"herbivore: a scalable and efficient protocol for anonymous communication","year":"2003","author":"goel","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"},{"key":"3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","article-title":"web mixes: a system for anonymous and unobservable internet access","author":"berthold","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"6","first-page":"244","article-title":"provably secure public-key encryption for length-preserving chaumian mixes","volume":"2612","author":"mo?ller","year":"2003","journal-title":"LNCS"},{"key":"5","first-page":"456","article-title":"dining cryptographers revisited","volume":"3027","author":"golle","year":"2004","journal-title":"LNCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0128-6"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492350"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199430.pdf?arnumber=5199430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:39Z","timestamp":1497825879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199430","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}