{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:03Z","timestamp":1740141783943,"version":"3.37.3"},"reference-count":20,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61105061","11NZYQN27","11NZYTH06"],"award-info":[{"award-number":["61105061","11NZYQN27","11NZYTH06"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006250","name":"Southwest University","doi-asserted-by":"publisher","award":["61105061","11NZYQN27","11NZYTH06"],"award-info":[{"award-number":["61105061","11NZYQN27","11NZYTH06"]}],"id":[{"id":"10.13039\/501100006250","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006250","name":"Southwest University","doi-asserted-by":"publisher","award":["61105061","11NZYQN27","11NZYTH06"],"award-info":[{"award-number":["61105061","11NZYQN27","11NZYTH06"]}],"id":[{"id":"10.13039\/501100006250","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["61105061","11NZYQN27","11NZYTH06"],"award-info":[{"award-number":["61105061","11NZYQN27","11NZYTH06"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,5,1]]},"abstract":"<jats:p> This paper presents a secure and practical verifiable multi-secret sharing scheme with application on multimedia sensor networks. By utilizing the merits of biometric cryptography, the proposed scheme can reliably conceal private information and overcome the shortcoming of the traditional cryptography. Security analysis shows that the proposed scheme provides secure, robust, and trustworthy verification of dealer and participants over insecure wireless multimedia sensor networks. <\/jats:p>","DOI":"10.1155\/2013\/375953","type":"journal-article","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:35:57Z","timestamp":1367973357000},"page":"375953","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Verifiable Multisecret Sharing Scheme in Wireless Multimedia Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Xianfeng","family":"Guo","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Southwest University for Nationalities, Chengdu 610041, China"}]},{"given":"Qing","family":"Luo","sequence":"additional","affiliation":[{"name":"Sichuan Conservatory of Music, Chengdu 610021, China"}]}],"member":"179","published-online":{"date-parts":[[2013,5,7]]},"reference":[{"key":"B1-2013-375953","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"B2-2013-375953","doi-asserted-by":"publisher","DOI":"10.3390\/s110201607"},{"key":"B3-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.010"},{"key":"B4-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.10.004"},{"key":"B5-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.03.368"},{"key":"B6-2013-375953","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"first-page":"313","volume-title":"Proceedings of the AFIPS National Computer Conference","author":"Blakley G.","key":"B7-2013-375953"},{"key":"B8-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.04.081"},{"key":"B9-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.05.011"},{"issue":"12","key":"B10-2013-375953","first-page":"2762","volume":"83","author":"Chien H.-Y.","year":"2000","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"B11-2013-375953","doi-asserted-by":"publisher","DOI":"10.1049\/el:19950073"},{"key":"B12-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2006.05.003"},{"key":"B13-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(03)00355-2"},{"first-page":"251","volume-title":"Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS \u203285)","author":"Chor B.","key":"B14-2013-375953"},{"key":"B15-2013-375953","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252871"},{"key":"B16-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.08.023"},{"key":"B17-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.08.004"},{"key":"B18-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.02.004"},{"key":"B19-2013-375953","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.12.015"},{"volume-title":"Proceedings of the 19th International Conference on Pattern Recognition (ICPR \u203208)","author":"Wu X.","key":"B20-2013-375953"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/375953","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/375953","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/375953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:25:58Z","timestamp":1621203958000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/375953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5,1]]}},"alternative-id":["10.1155\/2013\/375953"],"URL":"https:\/\/doi.org\/10.1155\/2013\/375953","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}