{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:06:16Z","timestamp":1725512776859},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icccn.2010.5560026","type":"proceedings-article","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T16:30:51Z","timestamp":1283877051000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Secure Data Aggregation through Proactive Defense"],"prefix":"10.1109","author":[{"given":"Shuo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Pierre","sequence":"additional","affiliation":[]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/762483.762485"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2008.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529552"},{"key":"ref13","first-page":"14","article-title":"Bar gossip","author":"li","year":"2006","journal-title":"OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-008-9073-6"},{"key":"ref15","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217937"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25840-7_6"},{"year":"0","key":"ref18","article-title":"Error function"},{"year":"0","key":"ref19","article-title":"SETI@home statistics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2007.32"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400772"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(90)90012-Q"},{"article-title":"Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols","year":"2003","author":"jelasity","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238221"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1082469.1082470"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941427"},{"year":"0","key":"ref20","article-title":"Interdecile range"}],"event":{"name":"2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010)","start":{"date-parts":[[2010,8,2]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2010,8,5]]}},"container-title":["2010 Proceedings of 19th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5559661\/5560011\/05560026.pdf?arnumber=5560026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:56:59Z","timestamp":1490054219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5560026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn.2010.5560026","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}