{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:16:02Z","timestamp":1729653362175,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/wowmom.2008.4594925","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T15:35:49Z","timestamp":1218641749000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Secure data recollection for redundantly deployed wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Luis E.","family":"Palafox","sequence":"first","affiliation":[]},{"given":"J. Antonio","family":"Garcia-Macias","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","article-title":"the rc5 encryption algorithm","volume":"1008","author":"rivest","year":"1994","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code","year":"1996","author":"schneier","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0229-6","author":"perrig","year":"2003","journal-title":"Secure Broadcast Communication In Wired and Wireless Networks"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"year":"1989","key":"11","article-title":"data cryptographic techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm."},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0016-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1694"},{"year":"0","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_358"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.12.029"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1286170"},{"key":"9","first-page":"384","article-title":"secure aggregation for wireless network","author":"hu","year":"2003","journal-title":"Proc SAINT Workshops"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"}],"event":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM)","start":{"date-parts":[[2008,6,23]]},"location":"Newport Beach, CA, USA","end":{"date-parts":[[2008,6,26]]}},"container-title":["2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586176\/4594794\/04594925.pdf?arnumber=4594925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:53:33Z","timestamp":1497768813000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2008.4594925","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}