{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:11:09Z","timestamp":1730290269266,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/pimrc.2017.8292541","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T16:31:53Z","timestamp":1518712313000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A semi-outsourcing secure data privacy scheme for IoT data transmission"],"prefix":"10.1109","author":[{"given":"Xiaoshuai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Poslad","sequence":"additional","affiliation":[]},{"given":"Zixiang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2010.5657908"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2012.6399701"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306397"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2299807"},{"journal-title":"Cryptography Theory and Practice","year":"2005","author":"stinson","key":"ref16"},{"journal-title":"Miracl-multiprecision Integer and Rational Arithmetic C\/c++ Library","year":"2012","author":"scott","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2499770"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/08839510500484181"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref5","first-page":"93","article-title":"An evaluation framework for adaptive security for the IoT in ehealth","volume":"7","author":"leister","year":"2014","journal-title":"International Journal on Advances in Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s150613069"},{"journal-title":"The Importance of IoT Data Collection","year":"2016","author":"seitz","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2321378"}],"event":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2017,10,8]]},"location":"Montreal, QC","end":{"date-parts":[[2017,10,13]]}},"container-title":["2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288420\/8292162\/08292541.pdf?arnumber=8292541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T17:54:32Z","timestamp":1521482072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2017.8292541","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}