{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:19Z","timestamp":1750501459051},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682341","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T09:08:43Z","timestamp":1294391323000},"page":"1-8","source":"Crossref","is-referenced-by-count":31,"title":["From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Honglong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460884"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref14","article-title":"Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Netowrks","author":"deng","year":"2004","journal-title":"IEEE DSN"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.315"},{"key":"ref5","article-title":"Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks","author":"xi","year":"2006","journal-title":"the 2nd International Workshop on Security in Systems and Networks (SSN)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462096"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682341.pdf?arnumber=5682341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:31:13Z","timestamp":1490059873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682341","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}