{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:53:39Z","timestamp":1761663219915},"reference-count":12,"publisher":"International Academy Publishing (IAP)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.9.1.190-194","type":"journal-article","created":{"date-parts":[[2014,1,29]],"date-time":"2014-01-29T16:07:23Z","timestamp":1391011643000},"source":"Crossref","is-referenced-by-count":2,"title":["Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs"],"prefix":"10.17706","volume":"9","author":[{"given":"Yong","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Dong","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,1,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"ref2","first-page":"7","article-title":"MNP: Multihop network reprogramming service for sensor networks","volume-title":"Proceedings of the 25th IEEE International Conference on Distributed Computing Systems","author":"Kulkarni","year":"2005","unstructured":"[4] S.S. Kulkarni and L.M. Wang, \"MNP: Multihop network reprogramming service for sensor networks,\" In ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp.7\u201316, Washington, DC, USA, 2005."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/941350.941359","article-title":"Efficient code distribution in wireless sensor networks","volume-title":"Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications","author":"Reijers","year":"2003","unstructured":"[5] N. Reijers and K. Langendoen, \"Efficient code distribution in wireless sensor networks,\" In WSNA '03: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, pp.60\u201367, New York, NY, USA, 2003. ACM."},{"key":"ref4","first-page":"457","article-title":"Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes","volume-title":"Proceedings of the 7th international conference on Information processing in sensor networks","author":"Hagedorn","year":"2008","unstructured":"[6] A.Hagedorn, D. Starobinski, and A. Trachtenberg, \"Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes,\" In IPSN '08: Proceedings of the 7th international conference on Information processing in sensor networks, pp.457\u2013466, Washington, DC, USA, 2008. IEEE Computer Society."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.109"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/ICDCS.2011.51","article-title":"LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks","volume-title":"Proceedings of IEEE ICDCS","author":"Zhang","year":"2011","unstructured":"[10] R. Zhang and Y.C. Zhang, \"LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks,\" In Proceedings of IEEE ICDCS, 2011."},{"key":"ref7","first-page":"271","article-title":"LT Codes","volume-title":"Foundations of Computer Science FOCS 2002","author":"Luby","year":"2002","unstructured":"[12] M. Luby, \"LT Codes,\" In Foundations of Computer Science, FOCS 2002, pp.271\u2013282. IEEE, 2002."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060603"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.012511.102146"},{"key":"ref12","first-page":"683","article-title":"Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks","volume-title":"Proceedings of the 2012 Eighth International Conference on Computer Intelligence and Security","author":"Zeng","year":"2012","unstructured":"[18] Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, and Zhihong Liu, \"Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks\", in CIS'2012: Proceedings of the 2012 Eighth International Conference on Computer Intelligence and Security, pp.683-686, Guangzhou, China, November, 2012."}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T17:23:13Z","timestamp":1648142593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":12,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.9.1.190-194","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}