{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:54:06Z","timestamp":1729626846513,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761329","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"759-762","source":"Crossref","is-referenced-by-count":0,"title":["Private and resilient data aggregation"],"prefix":"10.1109","author":[{"given":"Mathieu","family":"Cunche","sequence":"first","affiliation":[]},{"given":"Cedric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029116"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382246"},{"key":"14","article-title":"Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks","author":"ugus","year":"2007","journal-title":"2nd Workshop on Embedded Systems Security WESS'2007"},{"key":"11","first-page":"159","article-title":"A range test secure in the active adversary model","volume":"7","author":"peng","year":"2007","journal-title":"Australasian symposium on ACSW frontiers-ACSW '"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"3","first-page":"15","article-title":"Sepia: Privacy-preserving aggregation of multi-domain network events and statistics","author":"burkhart","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security Ser USENIX Security'10"},{"key":"2","first-page":"2010","article-title":"On the security economics of electricity metering","author":"anderson","year":"2010","journal-title":"3rd Ann Workshop on Economics and Information Security"},{"key":"1","first-page":"118","article-title":"I have a dream!: Differentially private smart metering","author":"a?cs","year":"2011","journal-title":"International conference on Information hiding-IH'11 Lecture Notes in Computer Science 6958"},{"key":"10","first-page":"247","article-title":"A novel test","author":"peng","year":"2006","journal-title":"Lynn Margaret Batten and Reihaneh Safavi-Naini Australasian Conference on Information Security and Privacy ACISP 2006 volume 4058 of Lecture Notes in Computer Science"},{"key":"7","article-title":"Private resilient data aggregation rapport de recherche rr-8330","author":"cunche","year":"2013","journal-title":"INRIA"},{"key":"6","first-page":"13","article-title":"Towards statistical queries over distributed private user data","author":"chen","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation NSDI'12"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WIOPT2008.3183"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180356"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"8","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","article-title":"Privacy-friendly energy-metering via homomorphic encryption","author":"garcia","year":"2011","journal-title":"Proceedings of the 6th international conference on Security and trust management STM'10"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761329.pdf?arnumber=6761329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:34:53Z","timestamp":1498109693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761329","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}