{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T16:28:54Z","timestamp":1771864134083,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ITRA Mobile grant 15(59)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,4]]},"DOI":"10.1145\/2833312.2849559","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T14:54:02Z","timestamp":1454684042000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A cloud security framework for a data centric WSN application"],"prefix":"10.1145","author":[{"given":"Sayantani","family":"Saha","sequence":"first","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Rounak","family":"Das","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Suman","family":"Datta","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Sarmistha","family":"Neogy","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]}],"member":"320","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079353.2079357"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427537"},{"key":"e_1_3_2_1_4_1","unstructured":"Andruino Health kit: https:\/\/www.cooking-hacks.com\/ehealth-sensors-complete-kit-biometric-medical-arduino-raspberry-pi.  Andruino Health kit: https:\/\/www.cooking-hacks.com\/ehealth-sensors-complete-kit-biometric-medical-arduino-raspberry-pi."},{"key":"e_1_3_2_1_5_1","first-page":"157","volume-title":"Applications and Innovations in Mobile Computing (AIMoC)","author":"Biswas S.","year":"2014"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.291"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Gentry C. 2009. A fully homomorphic encryption scheme (Doctoral dissertation Stanford University).   Gentry C. 2009. A fully homomorphic encryption scheme (Doctoral dissertation Stanford University).","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_9_1","volume-title":"Bulletin of the EATCS.","author":"Gasarch W.","year":"2004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063384"},{"key":"e_1_3_2_1_11_1","volume-title":"2012 21st international conference on (pp. 1--7). IEEE.","author":"Lounis A.","year":"2012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.928623"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIMOC.2015.7083846"},{"key":"e_1_3_2_1_15_1","unstructured":"Electronic health records National Institute of Health: http:\/\/www.nlm.nih.gov\/medlineplus\/magazine\/issues\/summer09\/articles\/summer09pg17.html  Electronic health records National Institute of Health: http:\/\/www.nlm.nih.gov\/medlineplus\/magazine\/issues\/summer09\/articles\/summer09pg17.html"},{"key":"e_1_3_2_1_16_1","unstructured":"OPENVAS\n\n  \n  : sectools.org\/tool\/openvas\/  OPENVAS: sectools.org\/tool\/openvas\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Housley R. 2002. Advanced Encryption Standard (AES) Key Wrap Algorithm(No. RFC 3394).  Housley R. 2002. Advanced Encryption Standard (AES) Key Wrap Algorithm (No. RFC 3394)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586118"},{"key":"e_1_3_2_1_19_1","unstructured":"Katz J. 2002. Efficient Cryptographic Protocols Preventing \"Man-in-the-Middle\" Attacks (Doctoral dissertation COLUMBIA UNIVERSITY).   Katz J. 2002. Efficient Cryptographic Protocols Preventing \"Man-in-the-Middle\" Attacks (Doctoral dissertation COLUMBIA UNIVERSITY)."},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Cryptology--EUROCRYPT 2013 (pp. 245--261)","author":"Stevens M."},{"key":"e_1_3_2_1_21_1","unstructured":"Chowdhury C. & Neogy S. 2009. Checkpointing using mobile agents for mobile computing system. the International Journal of Recent Trends in Engineering (1) 26--29.  Chowdhury C. & Neogy S. 2009. Checkpointing using mobile agents for mobile computing system. the International Journal of Recent Trends in Engineering (1) 26--29."},{"key":"e_1_3_2_1_22_1","volume-title":"High Performance Computing--HiPC 2007 (pp. 599--611)","author":"Chowdhury C."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"McGrew D. A. 2011. Fundamental Elliptic Curve Cryptography Algorithms.  McGrew D. A. 2011. Fundamental Elliptic Curve Cryptography Algorithms.","DOI":"10.17487\/rfc6090"}],"event":{"name":"ICDCN '16: 17th International Conference on Distributed Computing and Networking","location":"Singapore Singapore","acronym":"ICDCN '16"},"container-title":["Proceedings of the 17th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2849559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2833312.2849559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2849559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":23,"alternative-id":["10.1145\/2833312.2849559","10.1145\/2833312"],"URL":"https:\/\/doi.org\/10.1145\/2833312.2849559","relation":{},"subject":[],"published":{"date-parts":[[2016,1,4]]},"assertion":[{"value":"2016-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}