{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:06:29Z","timestamp":1773410789776,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062007","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"963-971","source":"Crossref","is-referenced-by-count":26,"title":["FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"S.","family":"Yu","sequence":"first","affiliation":[{"name":"Dept. of ECE, Worcester Polytech. Inst., Worcester, MA"}]},{"given":"K.","family":"Ren","sequence":"additional","affiliation":[]},{"given":"W.","family":"Lou","sequence":"additional","affiliation":[{"name":"Dept. of ECE, Worcester Polytech. Inst., Worcester, MA"}]}],"member":"263","reference":[{"key":"19","article-title":"recovation and tracing schemes for stateless receivers","author":"naor","year":"2001","journal-title":"Advances in Crytology CRYPTO'01"},{"key":"17","article-title":"collusion- resistant group key management using attribute-aased encryption","author":"cheung","year":"2007","journal-title":"Cryptology ePrint Archive Report"},{"key":"18","article-title":"broadcast encryption","author":"fiat","year":"1993","journal-title":"Advances in Crytology CRYPTO'93"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2007.06.002","article-title":"securing distributed data storage and retrieval in sensor networks","author":"subramanian","year":"2007","journal-title":"Pervasive and Mobile Computing Journal (Special Issue for PerCom 2007)"},{"key":"16","article-title":"collusion resistant broadcast encryption with short ciphertexts and private keys","author":"boneh","year":"2005","journal-title":"Advances in Crytology CRYPTO'05"},{"key":"13","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE S & P'03"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861382"},{"key":"11","article-title":"lhap: a lightweight hopby-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"ICDCSW'03"},{"key":"12","article-title":"stastical en-route filtering of injected false data in sensor networks","author":"ye","year":"2004","journal-title":"IEEE INFOCOM'04"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570664"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460900"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.303"},{"key":"25","year":"0"},{"key":"26","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814918"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"10","first-page":"36","article-title":"towards in-situ data storage in sensor databases","volume":"3746","author":"zeinalipour-yazti","year":"2005","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.003"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2005.1556859"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1296538"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993145"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/371626.371720"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182827"},{"key":"8","article-title":"high-performance low power sensor platforms featuring gigabyte scale storage","author":"mitra","year":"2005","journal-title":"MobiQuitous'05"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2009,4,19]]},"end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062007.pdf?arnumber=5062007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:22:47Z","timestamp":1677781367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062007","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}