{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:21:11Z","timestamp":1725754871202},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423606","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"19-27","source":"Crossref","is-referenced-by-count":1,"title":["Secure sensor network SUM aggregation with detection of malicious nodes"],"prefix":"10.1109","author":[{"given":"Sunoh","family":"Choi","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","DOI":"10.1145\/1525856.1525858","article-title":"Efficient and provably secure aggregation of encrypted data in wsn","author":"castelluccia","year":"2009","journal-title":"ACM TOSN"},{"key":"15","article-title":"Secure and highly-available aggregation queries in large-scale sensor networks via set sampling","author":"yu","year":"2009","journal-title":"ACM IPSN'09"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/1132905.1132944","article-title":"SDap: A secure hop-by-hop data aggregation protocol for sensor networks","author":"yang","year":"2006","journal-title":"MobiHoc'06"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/INFCOM.2007.237"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1031495.1031525"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1060289.1060303"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1352533.1352546"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/1180405.1180440"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ICDE.2004.1320018"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/NPSEC.2007.4371623"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ICDE.2011.5767886"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1456403.1456419"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1559845.1559851"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICDCS.2011.45"},{"key":"8","article-title":"Efficient handling of adversary attacks in aggregation applications","author":"taban","year":"2008","journal-title":"ESORICS'08"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423606.pdf?arnumber=6423606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T19:03:49Z","timestamp":1714935829000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423606","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}