{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:35:22Z","timestamp":1729636522878,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2005.1506392","type":"proceedings-article","created":{"date-parts":[[2005,9,12]],"date-time":"2005-09-12T11:19:24Z","timestamp":1126523964000},"page":"69-78","source":"Crossref","is-referenced-by-count":1,"title":["Local data protection for in-network processing in sensor networks"],"prefix":"10.1109","author":[{"family":"Yi Ouyang","sequence":"first","affiliation":[]},{"family":"Zhengyi Le","sequence":"additional","affiliation":[]},{"given":"J.","family":"Ford","sequence":"additional","affiliation":[]},{"given":"F.","family":"Makedon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"17","first-page":"251","article-title":"Providing robust and ubiquitous security support for wireless mobile networks","author":"kong","year":"2001","journal-title":"Ninth Internation Conference on Network Protocols (ICNP'01)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022289"},{"key":"16","article-title":"Forward-secure commerical key esctow systems","author":"kim","year":"2001","journal-title":"IEEE Int l Workshop Enabling Technologies Infrastructure for Collaborative Enterprises"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863478"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITAPP.2010.5566625"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060303"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1023\/A:1016598314198","article-title":"Spins: Security protocols for sensor networks","author":"perrig","year":"2002","journal-title":"Wireless Networks Journal(WINET)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203366"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"27","article-title":"Location tracking in a wireless sensor network by mobile agents and its data fusion strategies","author":"tseng","year":"2003","journal-title":"Information Processing in Sensor Networks Second Internatinal Workshop IPSN 2003"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974124"},{"journal-title":"Constraints and approaches for distributed sensor network security","year":"2000","author":"carman","key":"29"},{"key":"3","article-title":"Forward-security in private-key cryptography","volume":"2612","author":"bellare","year":"2003","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-68697-5_1","article-title":"Keying hash functions for message authentication","author":"bellare","year":"1996","journal-title":"Adv Cryptol CRYPTO'96"},{"key":"10","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proceedings of the IEEE INFOCOM'04"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501438"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986870"},{"key":"6","article-title":"Enhancing base station security in wireless sensot networks","volume":"cu cs 952 3","author":"deng","year":"2003","journal-title":"University of Colorado Department of Computer Science Technical Report"},{"key":"5","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"31","article-title":"Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"Proc of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003)"},{"key":"4","article-title":"Pgp in constrained wireless devices","author":"brown","year":"2000","journal-title":"9th USENIX Security Symposium"},{"key":"9","article-title":"A taxonomy for key escrow encryption systems","volume":"39","author":"dorothy","year":"1996","journal-title":"Communications of the ACM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872818"}],"event":{"name":"ICPS '05. International Conference on Pervasive Services, 2005.","location":"Santorini, Greece"},"container-title":["ICPS '05. Proceedings. International Conference on Pervasive Services, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10064\/32279\/01506392.pdf?arnumber=1506392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T07:01:22Z","timestamp":1586415682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1506392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/perser.2005.1506392","relation":{},"subject":[]}}