{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:22:42Z","timestamp":1725394962587},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wifs.2011.6123135","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:03:26Z","timestamp":1326319406000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Channel aware encryption and decision fusion for wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Hyoungsuk","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Jinho","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Steven W.","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Jeongseok","family":"Ha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.837404"},{"journal-title":"Secure Distributed Detection in Wireless Sensor Networks via Encryption of Sensor Decision","year":"2009","author":"nadendla","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592683"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.919119"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"journal-title":"Tinysec Link Layer Security for Tiny Devices","year":"2003","author":"karlof","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.863033"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1657814"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.806982"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1904-0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"}],"event":{"name":"2011 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2011,11,29]]},"location":"Iguacu Falls, Brazil","end":{"date-parts":[[2011,12,2]]}},"container-title":["2011 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112284\/6123119\/06123135.pdf?arnumber=6123135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:06:27Z","timestamp":1490126787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wifs.2011.6123135","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}