{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:56:38Z","timestamp":1774626998685,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451016","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T20:06:51Z","timestamp":1203106011000},"page":"1-8","source":"Crossref","is-referenced-by-count":58,"title":["Anonymous Data Collection in Sensor Networks"],"prefix":"10.1109","author":[{"given":"James","family":"Horey","sequence":"first","affiliation":[]},{"given":"Michael M.","family":"Groat","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Esponda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Enhancing privacy through negative representations of data","author":"esponda","year":"2004","journal-title":"Technical Report University of New Mexico"},{"key":"ref11","article-title":"The tenet architecture for tiered sensor networks","author":"govindan","year":"2006","journal-title":"Sensys"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872817"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"ref16","article-title":"Network system challenges in selective sharing and verification for personal, social, and urban-scale sensing applications","author":"parker","year":"2006","journal-title":"HotNets"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref18","author":"reddy","year":"2007","journal-title":"Image browsing processing and clustering for participatory sensing Lessons from a dietsense prototype"},{"key":"ref19","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-947X(2006)132:6(475)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/371626.371720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref5","article-title":"Demonstration: Wireless sensor networks for traffic monitoring","author":"ergen","year":"2005","journal-title":"IPSN"},{"key":"ref8","article-title":"Negative surveys","author":"esponda","year":"2006","journal-title":"ArXiv Mathematics e-prints"},{"key":"ref7","author":"esponda","year":"2005","journal-title":"Negative Representations of Information"},{"key":"ref2","first-page":"45","article-title":"Collaborative filter with privacy","author":"canny","year":"2005","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/11836810_6","article-title":"Protecting data privacy through hard-to-reverse negative databases","author":"esponda","year":"2006","journal-title":"Information Security Conference"},{"key":"ref20","article-title":"Designing secure sensor networks","author":"shi","year":"2004","journal-title":"IEEE Wireless Communications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011772"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/601858.601861"},{"key":"ref25","article-title":"Challenges: Communication through silence in wireless sensor networks","author":"zhu","year":"2005","journal-title":"MobiSys"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","location":"Philadelphia, PA, USA","start":{"date-parts":[[2007,8,6]]},"end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451016.pdf?arnumber=4451016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T03:08:44Z","timestamp":1557284924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451016","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}