{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:27:33Z","timestamp":1725625653213},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/wowmom.2013.6583467","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:28Z","timestamp":1377790288000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Guarino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614334"},{"key":"22","article-title":"Posh: Proactive co-operative self-healing in unattended wireless sensor networks","author":"di pietro","year":"2008","journal-title":"IEEE SRDS'08"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683089"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513811"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.2.128-142"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566764"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1993042.1993051"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2009.5449662"},{"key":"13","article-title":"Adversaries and countermeasures in privacy-enhanced urban sensing systems","author":"de cristofaro","year":"0","journal-title":"IEEE SJ"},{"key":"14","article-title":"Dependable and secure data storage in wireless ad hoc networks: An assessment of DS 2","author":"chessa","year":"2004","journal-title":"WONS'04"},{"key":"11","article-title":"Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps","author":"di pietro","year":"2012","journal-title":"Elsevier PMC"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2009.08.012","article-title":"Preserving privacy in participatory sensing systems","author":"huang","year":"2010","journal-title":"Elsevier CC"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778422"},{"key":"3","article-title":"Mobile phone sensing systems: A survey","author":"khan","year":"2012","journal-title":"IEEE CST"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.17"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"10","article-title":"Epidemic data survivability in unattended wireless sensor networks","author":"di pietro","year":"2011","journal-title":"ACM WiSec'10"},{"key":"7","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","author":"padmavathi","year":"2009","journal-title":"!JCSIS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462056"},{"key":"4","article-title":"Towards trustworthy participatory sensing","author":"dua","year":"2009","journal-title":"Usenix HotSec'09"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.109"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.31"}],"event":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2013,6,4]]},"location":"Madrid, Spain","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570845\/6583357\/06583467.pdf?arnumber=6583467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T16:53:07Z","timestamp":1616172787000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6583467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2013.6583467","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}