{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:48:19Z","timestamp":1729662499055,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icin.2017.7899422","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T16:32:09Z","timestamp":1492446729000},"page":"260-267","source":"Crossref","is-referenced-by-count":0,"title":["Concealed regression for aggregation in low power wireless networks"],"prefix":"10.1109","author":[{"given":"Andrey","family":"Tolstikhin","sequence":"first","affiliation":[]},{"given":"Zeljko","family":"Zilic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"738","article-title":"Pattern Recognition and Machine Learning","volume":"4","author":"bishop","year":"2006","journal-title":"Pattern Recognition"},{"key":"ref11","first-page":"2288","article-title":"Public key based cryp-toschemes for data concealment in wireless sensor networks","volume":"5","author":"mykletun","year":"2006","journal-title":"IEEE International Conference on Communications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref13","first-page":"308","article-title":"A new public-key cryptosystem as secure as factoring","volume":"1403","author":"okamoto","year":"1998","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.28"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/844128.844142","article-title":"Tag","volume":"36","author":"madden","year":"2002","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.09.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2062547"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1094549.1094561"},{"key":"ref8","first-page":"1","article-title":"Intel Lab Data","year":"2004","journal-title":"Web Page Intel"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2293093"},{"key":"ref2","first-page":"2","article-title":"CDA: Concealed Data Aggregation in Wireless Sensor Networks","author":"girao","year":"2004","journal-title":"Proceedings of ACM Workshop on Wireless Security - WiSe"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2011.59"},{"key":"ref9","volume":"302","author":"cormen","year":"2003","journal-title":"Rivest Intro"}],"event":{"name":"2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)","start":{"date-parts":[[2017,3,7]]},"location":"Paris","end":{"date-parts":[[2017,3,9]]}},"container-title":["2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7897354\/7899236\/07899422.pdf?arnumber=7899422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T00:09:01Z","timestamp":1569024541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7899422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icin.2017.7899422","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}