{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:46:28Z","timestamp":1732034788063,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.252","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"188-195","source":"Crossref","is-referenced-by-count":10,"title":["Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Soufiene Ben","family":"Othman","sequence":"first","affiliation":[]},{"given":"Abdelbasset","family":"Trad","sequence":"additional","affiliation":[]},{"given":"Habib","family":"Youssef","sequence":"additional","affiliation":[]},{"given":"Hani","family":"Alzaid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CT-RSA Springer-Verlag (LNCS 4964)","article-title":"Aggregate message authentication codes","year":"2008","author":"katz","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.004"},{"journal-title":"The Security of the Cipher Block Chaining Message Authentication Code","year":"2001","author":"bellare","key":"18"},{"key":"15","first-page":"471","article-title":"A provably secure additive and multiplicative privacy homomorphism","author":"domingo-ferrer","year":"2002","journal-title":"Proc Information Security Conf"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"journal-title":"proceeding of IEEE INFOCOM","article-title":"Statistical en-route detection and filtering of injected false data in sensor networks","year":"2004","author":"ye","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480031"},{"key":"11","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1007\/s00778-004-0138-0","article-title":"Chrysanthis, balancing energy efficiency and quality of aggregate data in sensor networks","volume":"13","author":"sharaf","year":"2004","journal-title":"VLDB J"},{"journal-title":"Secure Boradcast Communication in Wired and Wireless Networks","year":"2002","author":"perrig","key":"12"},{"journal-title":"European Journal of Scientific Research","article-title":"Energy efficient secure data aggregation protocol for wireless sensor networks","year":"2011","author":"bhoopathy","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2007.4283909"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255111"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180355"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990096"},{"journal-title":"Wireless Sensor Networks","year":"2010","author":"vuran","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"5","first-page":"27","article-title":"Secure aggregation for wireless networks","author":"hu","year":"2003","journal-title":"Proceedings of Symp on Applications and the Internet Workshops"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029116"},{"key":"9","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.comcom.2004.12.029","article-title":"Espda: Energy-efficient secure pattern based data aggregation for wireless sensor networks","volume":"29","author":"cam","year":"2006","journal-title":"Computer Communication"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680840.pdf?arnumber=6680840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:28Z","timestamp":1498091188000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.252","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}