{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:38:33Z","timestamp":1761323913083},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/tifs.2013.2291326","type":"journal-article","created":{"date-parts":[[2013,11,19]],"date-time":"2013-11-19T18:53:30Z","timestamp":1384887210000},"page":"109-124","source":"Crossref","is-referenced-by-count":37,"title":["Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks"],"prefix":"10.1109","volume":"9","author":[{"given":"Chia-Mu","family":"Yu","sequence":"first","affiliation":[]},{"given":"Guo-Kai","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Ing-Yi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Erol","family":"Gelenbe","sequence":"additional","affiliation":[]},{"given":"Sy-Yen","family":"Kuo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"ref32","first-page":"1026","article-title":"Top-k query result completeness verification in sensor networks","author":"yu","year":"2013","journal-title":"Proc IEEE Int ICC Workshops"},{"key":"ref31","first-page":"2446","article-title":"Statistical en-route filtering of injected false data in sensor networks","author":"ye","year":"2004","journal-title":"Proc IEEE 23rd Annu Joint Conf Comput Commun INFOCOM"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2050140"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195476"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530777"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461927"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2109384"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098923"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01604-7_36"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.009"},{"key":"ref13","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"ref16","first-page":"1","article-title":"Global clock synchronization in sensor networks","author":"li","year":"2004","journal-title":"Proc IEEE Conf Comput Commun INFOCOM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1502777.1502779"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.112"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503134"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref6","first-page":"416","article-title":"Aggregate and veriably encrypted signatures from bilinear maps","author":"boneh","year":"2003","journal-title":"Proc Int Conf Theory Appl Cryptograph Tech Adv Cryptol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1038"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462094"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref9","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Proc ICALP"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01604-7_42"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref22","first-page":"53","article-title":"Cryptographic support for secure logs on untrusted machines","author":"schneier","year":"1998","journal-title":"Proc 7th USENIX Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132943"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180439"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6684617\/06665142.pdf?arnumber=6665142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T04:33:55Z","timestamp":1640234035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6665142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":37,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2291326","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}