{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:30:02Z","timestamp":1771659002799,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"AISRF-08140"},{"name":"ARC","award":["LP140100816"],"award-info":[{"award-number":["LP140100816"]}]},{"name":"NSF","award":["1652107"],"award-info":[{"award-number":["1652107"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2019,9,1]]},"DOI":"10.1109\/tbdata.2017.2702172","type":"journal-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T20:59:31Z","timestamp":1494622771000},"page":"379-392","source":"Crossref","is-referenced-by-count":37,"title":["SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-278X","authenticated-orcid":false,"given":"Deepak","family":"Puthal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2396-1704","authenticated-orcid":false,"given":"Xindong","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Nepal","family":"Surya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6610-1328","authenticated-orcid":false,"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1677-9525","authenticated-orcid":false,"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.25"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2012-0451"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0133-5"},{"key":"ref32","article-title":"Stream: The stanford data stream management system","author":"arasu","year":"2004"},{"key":"ref31","year":"0"},{"key":"ref30","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982404"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.24"},{"key":"ref35","article-title":"An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment","author":"wu","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref34","first-page":"277","article-title":"The design of the borealis stream processing engine","author":"abadi","year":"2005","journal-title":"Proc 2nd Biennial Conf Innovative Data Syst Res"},{"key":"ref28","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559972"},{"key":"ref29","author":"nagaratnam","year":"2004","journal-title":"Enterprise Java Security Building Secure J2EE Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/872853.872854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2937755"},{"key":"ref22","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.22"},{"key":"ref24","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/378995.379238"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107504"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360253"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-013-7130-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015056"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref14","first-page":"53","article-title":"A lightweight security framework for wireless sensor networks","volume":"2","author":"zia","year":"2011","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44668-0_65"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04882-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774786"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0170"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.02.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11872153_32"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.24"},{"key":"ref6","first-page":"567","article-title":"Evaluation of 90 nm 6 T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes","author":"selimis","year":"0","journal-title":"Proc of IEEE Int Symp on Circ and Syst IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9669-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2369958"},{"key":"ref7","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"0","journal-title":"Proc USENIX System Administration Conf"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.719"},{"key":"ref9","first-page":"6","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proc 7th USENIX Security Symp"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3013520"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/sec.93"},{"key":"ref48","first-page":"1","article-title":"A selective encryption scheme for protecting H. 264\/AVC video in multimedia social network","author":"peng","year":"2016","journal-title":"Multimedia Tools Appl"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2463205"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2006.40"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70753"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497449"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8819924\/07921576.pdf?arnumber=7921576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:55:27Z","timestamp":1657745727000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7921576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,1]]},"references-count":50,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2702172","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,1]]}}}