{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:53Z","timestamp":1750220873961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,16]]},"DOI":"10.1145\/3378065.3378158","type":"proceedings-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T10:42:21Z","timestamp":1586342541000},"page":"500-507","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Methods of Range Query and Access Control on Multidimensional Data of Two-layer Wireless Sensor Network Facing Privacy Protection"],"prefix":"10.1145","author":[{"given":"Deng","family":"Yun","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"}]},{"given":"Li","family":"Zonglin","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"}]},{"given":"Chen","family":"Shouxue","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"}]}],"member":"320","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"volume-title":"FEB","year":"2018","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"2334","volume":"201","author":"Xiao Alex","journal-title":"IEEE-ACM TRANSACTIONS ON NETWORKING"},{"key":"e_1_3_2_1_3_1","first-page":"639","volume":"201","author":"Ali Qasim","journal-title":"INTERNET AND WEB INFORMATION SYSTEMS"},{"volume":"201","journal-title":"Secure MAX\/MIN Queries in Two-Tiered Wireless Sensor Networks[J]. IEEE ACCESS","first-page":"14478","key":"e_1_3_2_1_4_1"},{"volume-title":"INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS","year":"2017","key":"e_1_3_2_1_5_1"},{"volume":"201","journal-title":"JOURNAL OF INTERNET TECHNOLOGY","first-page":"1471","key":"e_1_3_2_1_6_1"},{"volume":"201","journal-title":"ANNALS OF TELECOMMUNICATIONS","first-page":"9","key":"e_1_3_2_1_7_1"},{"volume":"201","journal-title":"INFORMATION SCIENCES","first-page":"461","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"12273","volume":"201","author":"Directed Walk-Based Random","journal-title":"SENSORS"},{"volume-title":"INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS","year":"2015","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","first-page":"266","volume":"201","author":"Butun I.","journal-title":"IEEE"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Nguyen T D Bui T V Dang V H etal Efficiently pre-serving data privacy range queries in Two-tiered Wire-less Sensor Networks[C]\/\/Proceedings of the International Conference on Ubiquitous Intelligence and Computing and International Conference on Autonomic and Trusted Computing Fukuoka Japan September 4-7 2012:973--978.  Nguyen T D Bui T V Dang V H et al. Efficiently pre-serving data privacy range queries in Two-tiered Wire-less Sensor Networks[C]\/\/Proceedings of the International Conference on Ubiquitous Intelligence and Computing and International Conference on Autonomic and Trusted Computing Fukuoka Japan September 4-7 2012:973--978.","DOI":"10.1109\/UIC-ATC.2012.18"},{"key":"e_1_3_2_1_13_1","unstructured":"Dai Hua Yang Geng Xiao Fu etal Energy efficient privacy protection range query method in two-layer sensor network [J]. Computer research and development 2015 52 (4): 983--993  Dai Hua Yang Geng Xiao Fu et al. Energy efficient privacy protection range query method in two-layer sensor network [J]. Computer research and development 2015 52 (4): 983--993"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Yi Y Li R Chen F etal A digital watermarking approach to secure and precise range query processing in sensor networks[C]\/\/Proceedings of the 32nd IEEE Conference on Computer Communications(INFOCOM2013) 2013:1950--1958.  Yi Y Li R Chen F et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]\/\/Proceedings of the 32nd IEEE Conference on Computer Communications(INFOCOM2013) 2013:1950--1958.","DOI":"10.1109\/INFCOM.2013.6566995"},{"volume-title":"Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE","author":"Liu D.","key":"e_1_3_2_1_15_1"}],"event":{"name":"ICIIP 2019: 2019 4th International Conference on Intelligent Information Processing","sponsor":["Guilin Guilin University of Technology, Guilin, China","Wuhan University of Technology Wuhan University of Technology, Wuhan, China","International Engineering and Technology Institute, Hong Kong International Engineering and Technology Institute, Hong Kong"],"location":"China China","acronym":"ICIIP 2019"},"container-title":["Proceedings of the 2019 4th International Conference on Intelligent Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378065.3378158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378065.3378158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:00Z","timestamp":1750202640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378065.3378158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,16]]},"references-count":15,"alternative-id":["10.1145\/3378065.3378158","10.1145\/3378065"],"URL":"https:\/\/doi.org\/10.1145\/3378065.3378158","relation":{},"subject":[],"published":{"date-parts":[[2019,11,16]]},"assertion":[{"value":"2020-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}