{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:09:05Z","timestamp":1725674945558},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062038","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"1242-1250","source":"Crossref","is-referenced-by-count":8,"title":["Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"A.","family":"Liu","sequence":"first","affiliation":[{"name":"Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC"}]},{"given":"P.","family":"Ning","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC"}]},{"given":"C.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"263","article-title":"efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks","author":"liu","year":"2003","journal-title":"Proc Network and Distributed System Security Symp (NDSS '03)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"17","article-title":"trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks","author":"levis","year":"2004","journal-title":"Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI '04)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/941355.941359"},{"year":"0","key":"18"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.21236\/ADA482630","article-title":"a remote code update mechanism for wireless sensor networks","author":"stathopoulos","year":"2003"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.50"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.77"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"journal-title":"Deluge 2 0 - TinyOS Network Programming","year":"0","author":"hui","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"21","first-page":"277","article-title":"sprinkler: a reliable and scalable data dissemination service for wireless embedded devices","author":"naik","year":"2005","journal-title":"Proc IEEE Int'l Real-Time Systems Symp"},{"journal-title":"An open-source os for the networked sensor regime","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"journal-title":"Wireless measurement system","year":"0","author":"micaz","key":"2"},{"journal-title":"Bouncy Castle Crypto APIs","year":"0","key":"1"},{"key":"10","article-title":"packet leashes: a defense against wormhole attacks in wireless ad hoc networks","author":"hu","year":"2003","journal-title":"Proc INFOCOM 2003"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127822"},{"year":"2003","key":"6"},{"journal-title":"ChipCon 2 4 GHz IEEE 802 15 4\/ZigBee-ready RF Transceiver","year":"0","key":"5"},{"journal-title":"Standards for efficient cryptography - SEC 2 Recommended elliptic curve domain parameters","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1109\/IPSN.2006.243821","article-title":"securing the deluge network programming system","author":"dutta","year":"2006","journal-title":"Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN '06)"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062038.pdf?arnumber=5062038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:22:25Z","timestamp":1677781345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062038","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}