{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:55:54Z","timestamp":1762271754422},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/wowmom.2013.6583470","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:28Z","timestamp":1377790288000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Malleability resilient (premium) Concealed Data Aggregation"],"prefix":"10.1109","author":[{"given":"Dirk","family":"Westhoff","sequence":"first","affiliation":[]},{"given":"Osman","family":"Ugus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"journal-title":"Making NTRU As Secure As Worst-Case Problems over Ideal Lattices","year":"2011","author":"stehl","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.09.006"},{"key":"15","article-title":"Computational details of the votehere homomorphic election system","author":"adler","year":"2000","journal-title":"Proc Ann Int Conf Theory and Application of Cryptology and Information Security (ASIACRYPT"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"13","first-page":"68","article-title":"Signing a linear subspace: Signature schemes for network coding","author":"boneh","year":"2009","journal-title":"PKC'09"},{"key":"14","first-page":"1","article-title":"Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures","author":"boneh","year":"2011","journal-title":"PKC'10"},{"key":"11","first-page":"149","author":"boneh","year":"2011","journal-title":"Homomorphic Signatures for Polynomial Functions EUROCRYPT'11"},{"key":"12","first-page":"17","article-title":"Homomorphic network coding signatures in the standard model","author":"attrapadung","year":"2011","journal-title":"PKC'10"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"20","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-85093-9_21","article-title":"Some information theoretic arguments for encryption: Nonmalleability and chosen-ciphertext security (invited talk)","author":"hanaoka","year":"2008","journal-title":"Proceedings of the 3rd International Conference on Information Theoretic Security Ser ICITS 08"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"},{"key":"1","article-title":"CDA: Concealed data aggregation in wireless sensor networks","author":"girao","year":"2004","journal-title":"Proc ACM Workshop Wireless Security (WiSe 04) in Conjunction with ACM MobiCom 04"},{"journal-title":"Fully Homomorphic Message Authenticators","year":"0","author":"gennaro","key":"10"},{"key":"7","article-title":"Public key based crypto schemes for data concealment in wireless sensor networks","author":"mykletun","year":"2006","journal-title":"Proc IEEE Int Conf Comm (ICC"},{"key":"6","first-page":"292","article-title":"Homomorphic macs: Mac-based integrity for network coding","author":"agrawal","year":"2009","journal-title":"Proc of 7th ACNS'09"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1109\/CCNC.2007.45","article-title":"On concealed data aggregation for wireless sensor networks","author":"peter","year":"2007","journal-title":"Proc Fourth IEEE Consumer Comm and Networking Conf (CCNC"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.019"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45811-5_37"}],"event":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2013,6,4]]},"location":"Madrid","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570845\/6583357\/06583470.pdf?arnumber=6583470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:58:24Z","timestamp":1498064304000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2013.6583470","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}