{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:33Z","timestamp":1730276493412,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335058","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Data aggregation using homomorphic encryption in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"T.D.","family":"Ramotsoela","sequence":"first","affiliation":[{"name":"Department of Electrical, Electronic and Computer Engineering, University of Pretoria, Tshwane, South Africa"}]},{"given":"G.P.","family":"Hancke","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong"}]}],"member":"263","reference":[{"key":"ref33","first-page":"15","article-title":"Maximizing throughput in ZigBee wireless networks through analysis, simulations and implementations","author":"burchfield","year":"2009","journal-title":"Proc Int Workshop Localized Algor Protocols WSNs"},{"key":"ref32","first-page":"471","article-title":"A Provably Secure Additive and Multiplicative Privacy Homomorphism","author":"domingo-ferrer","year":"2002","journal-title":"Proceeding ISC &#x2018;02 Proceedings of the 5th International Conference on Information Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.277"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2011.6072109"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.06.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945586"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"6869","DOI":"10.3390\/s90906869","article-title":"An Overview on Wireless Sensor Networks Technology and Evolution","volume":"9","author":"buratti","year":"2009","journal-title":"SENSORS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-701-5.ch001"},{"key":"ref15","first-page":"575","article-title":"Wireless Sensor Networks: Principles and Applications","author":"townsend","year":"2004","journal-title":"Sensor Technology Handbook"},{"key":"ref16","first-page":"15","article-title":"Intoduction","author":"stalling","year":"2011","journal-title":"Network Security Essentials Peason Education Incv"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"ref19","first-page":"596","article-title":"I can't get no satisfaction","author":"pfleeger","year":"2011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s150306818"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494953"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2013.053718"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-642-14623-7_8","article-title":"Additively homomorphic encryption with d-operand multiplications","author":"aguilar-melchor","year":"2010","journal-title":"CRYPTO 2010 International Cryptology Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.042769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2002.1030829"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref9","article-title":"Security Challenges for User-Oriented RFID Applications within the &#x2018;Internet of Things","volume":"11","author":"hancke","year":"2010","journal-title":"Journal of Internet Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2313348"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"ref22","first-page":"520","article-title":"Not All as It Seems","author":"pfleeger","year":"2011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref24","first-page":"311","article-title":"Study of Attacks and Countermeasures in Wireless Sensor Networks","volume":"8","author":"bin","year":"2012","journal-title":"Advances in Information Sciences and Service Sciences"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1285913"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335058.pdf?arnumber=7335058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T20:15:44Z","timestamp":1704831344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7335058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335058","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}