{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:37Z","timestamp":1763468257656,"version":"3.37.3"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Purdue Cyber Center"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111512"],"award-info":[{"award-number":["CNS-1111512"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002703","name":"Bajian Project for Selected Researchers in Jiangsu University","doi-asserted-by":"publisher","award":["1213000013"],"award-info":[{"award-number":["1213000013"]}],"id":[{"id":"10.13039\/501100002703","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2016,2,1]]},"DOI":"10.1109\/tpds.2015.2402156","type":"journal-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T14:40:39Z","timestamp":1423579239000},"page":"405-418","source":"Crossref","is-referenced-by-count":38,"title":["Dictionary Based Secure Provenance Compression for Wireless Sensor Networks"],"prefix":"10.1109","volume":"27","author":[{"given":"Changda","family":"Wang","sequence":"first","affiliation":[]},{"given":"Syed Rafiul","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1142\/1676","author":"ihara","year":"1993","journal-title":"Information Theory for Continuous Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.368958"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/844128.844142","article-title":"Tag: A tiny aggregation service for ad-hoc sensor networks","volume":"36","author":"madden","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"ref16","article-title":"A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks","author":"sultana","year":"0","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref17","first-page":"1","article-title":"The case of the fake picasso: Preventing history forgery with secure provenance","author":"hasan","year":"0","journal-title":"Proc 7th Conf File Storage Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref4","first-page":"43","article-title":"Provenance-aware storage systems","author":"reddy","year":"0","journal-title":"Proc USENIX Annu Tech Conf General Track"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382312"},{"key":"ref5","first-page":"1","article-title":"Energy-efficient provenance transmission in large-scale wireless sensor networks","author":"alam","year":"0","journal-title":"Proc IEEE Int Symp World Wireless Mobile Multimedia Netw"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72163-5_11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-218-4_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.54"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"},{"key":"ref22","article-title":"Efficient lossless compression of trees and graphs","author":"chen","year":"0","journal-title":"Proc Data Compression Conf (DCC'96)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/7383375\/7038199.pdf?arnumber=7038199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:46:40Z","timestamp":1641988000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7038199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,1]]},"references-count":22,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2015.2402156","relation":{},"ISSN":["1045-9219"],"issn-type":[{"type":"print","value":"1045-9219"}],"subject":[],"published":{"date-parts":[[2016,2,1]]}}}