{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:48:39Z","timestamp":1775670519012,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451044","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T20:06:51Z","timestamp":1203106011000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Secure Data Transmission of Wireless Sensor Network Based on Information Hiding"],"prefix":"10.1109","author":[{"given":"Xiangrong","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lincong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Minggang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.479736"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/11558859_18","article-title":"ID Modulation: Embedding Sensor Data in an RFID Timeseries","author":"smith","year":"2005","journal-title":"Proc Information Hiding"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1327131"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.82"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.03.014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50027-5"},{"key":"ref17","first-page":"787","article-title":"Load Shedding in Stream Databases: A Control-Based Approach","volume":"32","author":"tu","year":"2006","journal-title":"Proc VLDB"},{"key":"ref18","first-page":"3","article-title":"TinySec: A Link Layer Security Architecture for Wireless Sensor Networks","author":"chris","year":"2004","journal-title":"Proc SneSys"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/1080829.1080849","article-title":"Self-management in chaotic wireless deployments","author":"akella","year":"2005","journal-title":"Proc Mobicom"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182809"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1161089.1161117","article-title":"Broadcast capacity in multihop wireless networks","author":"keshavarz-haddad","year":"2006","journal-title":"Proc Mobicom"},{"key":"ref6","first-page":"102","article-title":"A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks","volume":"4317","author":"alsakib","year":"2006","journal-title":"Proc ICDCIT"},{"key":"ref5","first-page":"185","article-title":"Self-management in chaotic wireless deployments","author":"akella","year":"2005","journal-title":"Proc 11th MobiCom"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.115"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1994.tb00612.x"},{"key":"ref20","first-page":"69","article-title":"Underground Structure Monitoring with Wireless Sensor Networks","author":"li","year":"2007","journal-title":"Proc ACM\/IEEE IPSN"},{"key":"ref22","article-title":"SENSE: Sensor Network Simulator and Simulator","author":"boleslaw","year":"2006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","location":"Philadelphia, PA, USA","start":{"date-parts":[[2007,8,6]]},"end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451044.pdf?arnumber=4451044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T11:16:44Z","timestamp":1708600604000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451044","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}