{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:05:08Z","timestamp":1759133108091,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/perser.2007.4283904","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:11:18Z","timestamp":1186600278000},"page":"145-148","source":"Crossref","is-referenced-by-count":32,"title":["Providing Anonymity in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Yi","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Zhengyi","family":"Le","sequence":"additional","affiliation":[]},{"given":"Yurong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Triandopoulos","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"James","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Fillia","family":"Makedon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424811"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/778445.778449"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref6","first-page":"251","article-title":"Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks","author":"kong","year":"2001","journal-title":"Ninth Internation Conference on Network Protocols (ICNP'01)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TMC.2005.50","article-title":"Ao2p: Ad hoc on-demand position-based private routing protocol","volume":"4","author":"wu","year":"2005","journal-title":"IEEE Trotsaction on Mobile Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref7","first-page":"411","article-title":"Onproviding anonymity in wireless sensor networks","author":"wadaa","year":"2004","journal-title":"Proceedings of the 10th International Conference on Parallel and Distributed Systems (ICPADS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2006.010834"},{"key":"ref9","first-page":"197","article-title":"Randomkey predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"IEEE International Conference on Pervasive Services","start":{"date-parts":[[2007,7,15]]},"location":"The Marmara Istanbul","end":{"date-parts":[[2007,7,20]]}},"container-title":["IEEE International Conference on Pervasive Services"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4283874\/4283875\/04283904.pdf?arnumber=4283904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T21:50:16Z","timestamp":1497736216000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4283904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/perser.2007.4283904","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}