{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:40Z","timestamp":1750306060653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T00:00:00Z","timestamp":1494806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,15]]},"DOI":"10.1145\/3075564.3079068","type":"proceedings-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T12:47:29Z","timestamp":1496839649000},"page":"396-401","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Private inter-network routing for Wireless Sensor Networks and the Internet of Things"],"prefix":"10.1145","author":[{"given":"Paolo","family":"Palmieri","sequence":"first","affiliation":[{"name":"Cranfield University, Centre for Electronic Warfare Information and Cyber, Shrivenham, Swindon, UK"}]},{"given":"Luca","family":"Calderoni","sequence":"additional","affiliation":[{"name":"University of Bologna, Dept. of Computer Science and Engineering, Cesena, Italy"}]},{"given":"Dario","family":"Maio","sequence":"additional","affiliation":[{"name":"University of Bologna, Dept. of Computer Science and Engineering, Cesena, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.06.011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.011413.00118"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jing Deng Richard Han and Shivakant Mishra. 2004. Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. In 2004 International Conference on Dependable Systems and Networks (DSN 2004) Proceedings. IEEE Computer Society 637.   Jing Deng Richard Han and Shivakant Mishra. 2004. Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. In 2004 International Conference on Dependable Systems and Networks (DSN 2004) Proceedings. IEEE Computer Society 637.","DOI":"10.1109\/DSN.2004.1311934"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.12.003"},{"volume-title":"Proceedings of the 13th USENIX Security Symposium, Matt Blaze (Ed.). USENIX, 303--320","author":"Dingledine Roger","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2354980"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"e_1_3_2_1_12_1","unstructured":"Yingshu Li My T. Thai and Weili Wu (Eds.). 2008. Wireless Sensor Networks and Applications. Springer.   Yingshu Li My T. Thai and Weili Wu (Eds.). 2008. Wireless Sensor Networks and Applications. Springer."},{"volume-title":"Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques","year":"1999","author":"Paillier Pascal","key":"e_1_3_2_1_13_1"},{"volume-title":"ICICS 2015","year":"2015","author":"Palmieri Paolo","key":"e_1_3_2_1_14_1"},{"volume-title":"Information Security and Cryptology - 10th International Conference, Inscrypt","year":"2014","author":"Palmieri Paolo","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2016.7580757"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"volume-title":"20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings. IEEE.","year":"2006","author":"Xi Yong","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143549.1143558"}],"event":{"name":"CF '17: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Siena Italy","acronym":"CF '17"},"container-title":["Proceedings of the Computing Frontiers Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3075564.3079068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:42Z","timestamp":1750215822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":19,"alternative-id":["10.1145\/3075564.3079068","10.1145\/3075564"],"URL":"https:\/\/doi.org\/10.1145\/3075564.3079068","relation":{},"subject":[],"published":{"date-parts":[[2017,5,15]]},"assertion":[{"value":"2017-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}