{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:50:18Z","timestamp":1725450618402},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/iswcs.2007.4392356","type":"proceedings-article","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T14:21:31Z","timestamp":1196691691000},"page":"332-336","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Protection Mechanisms for Hybrid Hierarchical Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Anelia","family":"Mitseva","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Gerlach","sequence":"additional","affiliation":[]},{"given":"Neeli R.","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2002.1000251"},{"journal-title":"Location Privacy in Ubiquitous Computing","year":"2005","author":"beresford","key":"ref11"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.8"},{"journal-title":"CRUISE Public Deliverable D210 1 Sensor Networks Architecture","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994181"},{"journal-title":"CRUISE Public Deliverable D230 2 Mobility and Security Framework for Wireless Sensor Networks","year":"0","key":"ref6"},{"key":"ref5","article-title":"A Four-Level Hierarchical Hybrid Network Model","author":"orriss","year":"2006","journal-title":"IST Mobile Summit"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/VETECS.2007.519","article-title":"Privacy in VANETs using Changing Pseudonyms - Ideal and Real (Poster Presentation)","author":"gerlach","year":"2007","journal-title":"Proc IEEE 65th Vehicular Technology Conf VTC2007-Spring"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1161023.1161032"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"journal-title":"CRUISE Project","year":"0","key":"ref1"},{"key":"ref9","article-title":"Security Framework for Vehicular Applications","author":"gerlach","year":"2007","journal-title":"The Third International Workshop on Vehicle-to-Vehicle Communications"}],"event":{"name":"2007 4th International Symposium on Wireless Communication Systems","start":{"date-parts":[[2007,10,17]]},"location":"Trondheim, Norway","end":{"date-parts":[[2007,10,19]]}},"container-title":["2007 4th International Symposium on Wireless Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4392271\/4392272\/04392356.pdf?arnumber=4392356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T21:48:04Z","timestamp":1497736084000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4392356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iswcs.2007.4392356","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}