{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:19:38Z","timestamp":1767676778313,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1145\/1023646.1023657","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"51-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":143,"title":["Visualization of wormholes in sensor networks"],"prefix":"10.1145","author":[{"given":"Weichao","family":"Wang","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"RADAR: An In-Building RF-Based User Location and Tracking System, in the Proceedings of INFOCOM","author":"Bahl P.","year":"2000","unstructured":"P. Bahl and V. Padmanabhan , RADAR: An In-Building RF-Based User Location and Tracking System, in the Proceedings of INFOCOM , 2000 . P. Bahl and V. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, in the Proceedings of INFOCOM, 2000."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984630"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0053715","volume-title":"Key Establishment Protocols for Secure Mobile Communications: A Selective Survey","author":"Boyd C.","year":"1998","unstructured":"C. Boyd and A. Mathuria , Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , Lecture Notes in Computer Science , 1998 . C. Boyd and A. Mathuria, Key Establishment Protocols for Secure Mobile Communications: A Selective Survey, Lecture Notes in Computer Science, 1998."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570653"},{"key":"e_1_3_2_1_7_1","volume-title":"John Wiley and Sons","author":"Davison M.","year":"1983","unstructured":"M. Davison , Multidimensional Scaling , John Wiley and Sons , 1983 . M. Davison, Multidimensional Scaling, John Wiley and Sons, 1983."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2004.03.020"},{"key":"e_1_3_2_1_9_1","volume-title":"Charles River Media","author":"O.","year":"2003","unstructured":"O. Garcia-Panyella, An easy-to-code smoothing algorithm for 3D reconstructed surfaces, Graphics programming methods, 139--146 , Charles River Media , Inc , 2003 . O. Garcia-Panyella, An easy-to-code smoothing algorithm for 3D reconstructed surfaces, Graphics programming methods, 139--146, Charles River Media, Inc, 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Matrix Computations","author":"Golub G.","year":"1996","unstructured":"G. Golub and C. V. Loan , Matrix Computations , Johns Hopkins University Press , 1996 . G. Golub and C. V. Loan, Matrix Computations, Johns Hopkins University Press, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/142920.134011"},{"key":"e_1_3_2_1_12_1","volume-title":"Using Directional Antennas to Prevent Wormhole Attacks, in the Proceedings of Network and Distributed System Security Symposium (NDSS)","author":"Hu L.","year":"2004","unstructured":"L. Hu and D. Evans , Using Directional Antennas to Prevent Wormhole Attacks, in the Proceedings of Network and Distributed System Security Symposium (NDSS) , 2004 . L. Hu and D. Evans, Using Directional Antennas to Prevent Wormhole Attacks, in the Proceedings of Network and Distributed System Security Symposium (NDSS), 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in the Proceedings of INFOCOM","author":"Hu Y.","year":"2003","unstructured":"Y. Hu , A. Perrig , and D. Johnson , Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in the Proceedings of INFOCOM , 2003 . Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in the Proceedings of INFOCOM, 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941317"},{"key":"e_1_3_2_1_15_1","volume-title":"Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling, in the Proceedings of IEEE INFOCOM","author":"Ji X.","year":"2004","unstructured":"X. Ji and H. Zha , Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling, in the Proceedings of IEEE INFOCOM , 2004 . X. Ji and H. Zha, Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling, in the Proceedings of IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_16_1","volume-title":"Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, in the Proceedings of INFOCOM, 13--21","author":"Ko Y.","year":"2000","unstructured":"Y. Ko , V. Shankarkumar , and N. Vaidya , Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, in the Proceedings of INFOCOM, 13--21 , 2000 . Y. Ko, V. Shankarkumar, and N. Vaidya, Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, in the Proceedings of INFOCOM, 13--21, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570674"},{"key":"e_1_3_2_1_18_1","volume-title":"Digital Halftoning Using a Blue-Noise Mask, in the Proceedings of the International Conference on Acoustics, Speech, and Signal Processing","author":"Mitsa T.","year":"1991","unstructured":"T. Mitsa and K. J. Parker , Digital Halftoning Using a Blue-Noise Mask, in the Proceedings of the International Conference on Acoustics, Speech, and Signal Processing , 1991 . T. Mitsa and K. J. Parker, Digital Halftoning Using a Blue-Noise Mask, in the Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, 1991."},{"key":"e_1_3_2_1_19_1","volume-title":"Ad hoc positioning system (APS) using AoA, in the Proceedings of INFOCOM","author":"Niculescu D.","year":"2003","unstructured":"D. Niculescu and B. Nath , Ad hoc positioning system (APS) using AoA, in the Proceedings of INFOCOM , 2003 . D. Niculescu and B. Nath, Ad hoc positioning system (APS) using AoA, in the Proceedings of INFOCOM, 2003."},{"key":"e_1_3_2_1_20_1","volume-title":"Secure Routing for Mobile Ad Hoc Networks, in the Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. Haas , Secure Routing for Mobile Ad Hoc Networks, in the Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) , 2002 . P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, in the Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_3_2_1_23_1","volume-title":"Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of USENIX Technical Annual Conference, 317--328","author":"Savarese C.","year":"2001","unstructured":"C. Savarese , K. Langendoen , and J. Rabaey , Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of USENIX Technical Annual Conference, 317--328 , 2001 . C. Savarese, K. Langendoen, and J. Rabaey, Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of USENIX Technical Annual Conference, 317--328, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"Locationing in Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of ICASSP","author":"Savarese C.","year":"2001","unstructured":"C. Savarese , J. Rabaey , and J. Beutel , Locationing in Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of ICASSP , 2001 . C. Savarese, J. Rabaey, and J. Beutel, Locationing in Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of ICASSP, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778439"},{"issue":"30","key":"e_1_3_2_1_27_1","first-page":"393","volume":"379","author":"Torgeson W.","year":"1965","unstructured":"W. Torgeson , Multidimensional scaling of similarity , Psychometrika , ( 30 ) 379 -- 393 , 1965 . W. Torgeson, Multidimensional scaling of similarity, Psychometrika, (30)379--393, 1965.","journal-title":"Psychometrika"},{"issue":"5","key":"e_1_3_2_1_28_1","first-page":"42","volume":"4","author":"Ward A.","year":"1997","unstructured":"A. Ward , A. Jones , and A. Hopper , A New Location Technique for the Active Office, in IEEE Personnel Communications , 4 ( 5 ): 42 -- 47 , 1997 . A. Ward, A. Jones, and A. Hopper, A New Location Technique for the Active Office, in IEEE Personnel Communications, 4(5):42--47, 1997.","journal-title":"A New Location Technique for the Active Office, in IEEE Personnel Communications"}],"event":{"name":"WiSE04: 2004 ACM Workshop on Wireless Security ( co-located with Mobicom 2004 Conference )","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Philadelphia PA USA","acronym":"WiSE04"},"container-title":["Proceedings of the 3rd ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023646.1023657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1023646.1023657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:25Z","timestamp":1750282885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023646.1023657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":27,"alternative-id":["10.1145\/1023646.1023657","10.1145\/1023646"],"URL":"https:\/\/doi.org\/10.1145\/1023646.1023657","relation":{},"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}