{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:14Z","timestamp":1750309214968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CT-0716567CT-0627493IIS-0242237IIS-0430402"],"award-info":[{"award-number":["CT-0716567CT-0627493IIS-0242237IIS-0430402"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460885","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Securely computing an approximate median in wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Sankardas","family":"Roy","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA and Universit\u00e0 di Roma \"La Sapienza\", Roma, Italy"}]},{"given":"Sanjeev","family":"Setia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"3","article-title":"The new jersey data reduction report","volume":"20","author":"Barbar\u00e1 D.","year":"1997","unstructured":"D. Barbar\u00e1 , W. DuMouchel , C. Faloutsos , P. J. Haas , J. M. Hellerstein , Y. E. Ioannidis , H. V. Jagadish , T. Johnson , R. T. Ng , V. Poosala , K. A. Ross , and K. C. Sevcik . The new jersey data reduction report . IEEE Data Eng. Bull. , 20 ( 4 ): 3 -- 45 , 1997 . D. Barbar\u00e1, W. DuMouchel, C. Faloutsos, P. J. Haas, J. M. Hellerstein, Y. E. Ioannidis, H. V. Jagadish, T. Johnson, R. T. Ng, V. Poosala, K. A. Ross, and K. C. Sevcik. The new jersey data reduction report. IEEE Data Eng. Bull., 20(4):3--45, 1997.","journal-title":"IEEE Data Eng. Bull."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1180345.1180356"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1180405.1180440"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/977401.978068"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-540-24698-5_7"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.xbow.com","author":"Crossbow Technology Inc.","year":"2008","unstructured":"Crossbow Technology Inc. http:\/\/www.xbow.com , 2008 . Crossbow Technology Inc. http:\/\/www.xbow.com, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1352533.1352546"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/564691.564775"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/375663.375670"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1055558.1055597"},{"unstructured":"Habitat Monitoring on Great Duck Island. http:\/\/www.greatduckisland.net\/.  Habitat Monitoring on Great Duck Island. http:\/\/www.greatduckisland.net\/.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/4372.4378"},{"unstructured":"James Reserve Microclimate and Video Remote Sensing. http:\/\/www.cens.ucla.edu.  James Reserve Microclimate and Video Remote Sensing. http:\/\/www.cens.ucla.edu.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/1060289.1060303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/276305.276342"},{"key":"e_1_3_2_1_16_1","volume-title":"Selection and sorting with limited storage. Theoretical Computer Science, (12):315--323","author":"Munro J. I.","year":"1980","unstructured":"J. I. Munro and M. S. Paterson . Selection and sorting with limited storage. Theoretical Computer Science, (12):315--323 , 1980 . J. I. Munro and M. S. Paterson. Selection and sorting with limited storage. Theoretical Computer Science, (12):315--323, 1980."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1031495.1031525"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.tcs.2006.10.032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1023\/A:1016598314198"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/235968.233342"},{"key":"e_1_3_2_1_21_1","volume-title":"Attack-resilient hierarchical data aggregation in sensor networks. Technical report","author":"Roy S.","year":"2008","unstructured":"S. Roy , M. Conti , S. Setia , and S. Jajodia . Attack-resilient hierarchical data aggregation in sensor networks. Technical report , Center for Secure Information Systems - George Mason University ( http:\/\/mason.gmu.edu\/~sroy1\/tr-median.pdf), March 2008 . S. Roy, M. Conti, S. Setia, and S. Jajodia. Attack-resilient hierarchical data aggregation in sensor networks. Technical report, Center for Secure Information Systems - George Mason University (http:\/\/mason.gmu.edu\/~sroy1\/tr-median.pdf), March 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1180345.1180355"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1031495.1031524"},{"unstructured":"The Firebug Project. http:\/\/firebug.sourceforge.net.  The Firebug Project. http:\/\/firebug.sourceforge.net.","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1029102.1029116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1132905.1132944"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/948109.948120"}],"event":{"sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"Securecomm08","name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","location":"Istanbul Turkey"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":27,"alternative-id":["10.1145\/1460877.1460885","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460885","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}