{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:04:23Z","timestamp":1726848263458},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/jsyst.2012.2221957","type":"journal-article","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T19:02:31Z","timestamp":1354302151000},"page":"311-322","source":"Crossref","is-referenced-by-count":10,"title":["Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems"],"prefix":"10.1109","volume":"7","author":[{"given":"Emiliano","family":"De Cristofaro","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378624"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560129"},{"key":"ref33","article-title":"AES proposal: Rijndael","author":"daeman","year":"1999","journal-title":"Proc 1st AES Conf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_39"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1341731.1341735"},{"key":"ref30","first-page":"303","article-title":"TOR: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proc Usenix Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808850"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592778"},{"key":"ref35","first-page":"20","article-title":"Event handoff unobservability in WSN","author":"ortolani","year":"2010","journal-title":"Proc iNetSec"},{"key":"ref34","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501452"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref2","first-page":"117","article-title":"Participatory sensing","author":"burke","year":"2006","journal-title":"Proc World Sensor Web Workshop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1234161.1234179"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"ref21","article-title":"On the computational practicality of private information retrieval","author":"sion","year":"2007","journal-title":"Proc NDSS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1340771.1340777"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497887"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11947950_57"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref51","first-page":"1","article-title":"Privacy-preserving querying in wireless sensor networks","author":"de cristofaro","year":"2009","journal-title":"Proc ICCCN"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462094"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689244"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460445"},{"key":"ref11","year":"2010","journal-title":"Quake-Catcher Network"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1016\/j.comcom.2009.08.012","article-title":"Preserving privacy in participatory sensing systems","volume":"33","author":"huang","year":"2010","journal-title":"Comput Commun"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814448"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.PERVASIVEHEALTH2010.8851"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.10.005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814442"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2010.5466993"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_9"},{"key":"ref4","article-title":"Sensing atmosphere","author":"paulos","year":"2007","journal-title":"Proc SenSys Workshops"},{"key":"ref3","article-title":"Senseweb: Browsing the physical world in real time","author":"santanche","year":"2006","journal-title":"Proc IPSN"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460444"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555823"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620549"},{"key":"ref49","author":"bagula","year":"2011","journal-title":"Wireless Sensors for AllLow Cost Open Solutions for Environmental Monitoring"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555834"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734592"},{"key":"ref45","article-title":"Toward trustworthy participatory sensing","author":"dua","year":"2009","journal-title":"Proc HotSec"},{"key":"ref48","first-page":"218","article-title":"Query privacy in urban sensing systems","author":"de cristofaro","year":"2012","journal-title":"Proc ICDCN"},{"key":"ref47","first-page":"23","article-title":"PEPSI: Privacy-enhanced participatory sensing infrastructure","author":"de cristofaro","year":"2011","journal-title":"Proc WiSec"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460440"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1592606.1592616"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4267003\/6504497\/06365736.pdf?arnumber=6365736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:28:13Z","timestamp":1638217693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6365736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":55,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2012.2221957","relation":{},"ISSN":["1932-8184","1937-9234"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}