{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:27:18Z","timestamp":1725398838012},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422398","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments"],"prefix":"10.1109","author":[{"given":"Omar Rafik Merad","family":"Boudia","sequence":"first","affiliation":[]},{"given":"Hichem","family":"Sedjelmaci","sequence":"additional","affiliation":[]},{"given":"Sidi Mohammed","family":"Senouci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1878537.1878703"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"journal-title":"TinyECC (Version 2 0)","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.07.008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883886"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.002"},{"key":"ref5","first-page":"2000e","article-title":"Secure and efficient verification for data aggregation in wireless sensor networks","author":"boudia","year":"2017","journal-title":"Int J Network Mgmt"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"ref20","article-title":"Optimal activation of intrusion detection agents for wireless sensor networks","author":"ponomarchuk","year":"2010","journal-title":"Fourth International Conference on Mobile Ubiquitous Computing Systems Services and Technologies"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2701551"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422398.pdf?arnumber=8422398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:33:29Z","timestamp":1598240009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422398","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}