{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:40:10Z","timestamp":1740141610191,"version":"3.37.3"},"reference-count":34,"publisher":"Informa UK Limited","issue":"6","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301142"],"award-info":[{"award-number":["61301142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ13F010001","Y201328392"],"award-info":[{"award-number":["LQ13F010001","Y201328392"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SRF for ROCS, SEM","award":["2013[1792]"],"award-info":[{"award-number":["2013[1792]"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"published-print":{"date-parts":[[2017,11,2]]},"DOI":"10.1080\/17445760.2016.1170831","type":"journal-article","created":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T11:14:47Z","timestamp":1461669287000},"page":"572-592","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["FMSLPP: fake-message based sink location privacy preservation for WSNs against global eavesdroppers"],"prefix":"10.1080","volume":"32","author":[{"given":"Yuanping","family":"Zou","sequence":"first","affiliation":[{"name":"School of Information &amp; Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China"}]},{"given":"Bidi","family":"Ying","sequence":"additional","affiliation":[{"name":"School of Information &amp; Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China"}]},{"given":"Dimitrios","family":"Makrakis","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada"}]}],"member":"301","published-online":{"date-parts":[[2016,4,26]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.03.001"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.010311.101885"},{"key":"CIT0003","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/SECPRI.2003.1199337","author":"Chan H.","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy (S&P \u201803)"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892880"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311934"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1364\/AO.33.001306"},{"key":"CIT0008","first-page":"842","author":"Ebrahimi Y.","year":"2011","journal-title":"Proceedings of 7th International Conference on Wireless Communication and Mobile Computing Conference"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962411"},{"key":"CIT0010","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","author":"Eschenaur L.","year":"2002","journal-title":"Proceedings of 9th ACM Conference on Computer and Communications Security"},{"key":"CIT0011","first-page":"1","volume":"2","author":"Heinzelman W.T.","year":"2000","journal-title":"Proceedings of the 33rd Annual Hawaii International Conference on System Sciences"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"CIT0015","first-page":"599","author":"Kamat P.","year":"2005","journal-title":"Proceedings of IEEE ICDCS"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1117\/12.2012337"},{"key":"CIT0017","first-page":"457","author":"Li X.","year":"2009","journal-title":"Proceedings of 5th International Conference on Mobile Adhoc and Sensor Networks"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741883"},{"key":"CIT0020","first-page":"293","author":"Maleki M.","year":"2005","journal-title":"IEEE Proceedings of Information Processing in Sensor Network"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.32"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/1298239.1298254"},{"key":"CIT0023","first-page":"1","author":"Oikonomou K.","year":"2007","journal-title":"Proceedings of AOC"},{"key":"CIT0025","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/1029102.1029117","author":"Ozturk C.","year":"2004","journal-title":"ACM Workshop on Security of Ad Hoc and Sensor Networks"},{"key":"CIT0026","first-page":"210","author":"Park H.","year":"2013","journal-title":"Proceedings on IEEE Infocom"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"CIT0028","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1023646.1023654","author":"Sastry N.","year":"2004","journal-title":"Wise\u201904: Proceedings of the 3rd ACM workshop on Wireless security"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/11943952"},{"journal-title":"Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International","year":"2006","author":"Xi Y.","key":"CIT0030"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/1062689"},{"key":"CIT0032","unstructured":"Crypto++ 5.6.0 Benchmarks, Available at https:\/\/linproxy.fan.workers.dev:443\/http\/www.cryptopp.com\/benchmarks.html"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"CIT0034","first-page":"1","author":"Yao J.","year":"2010","journal-title":"Proceedings of 2nd International Workshop on Database Technology and Applications"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928957"}],"container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.tandfonline.com\/doi\/pdf\/10.1080\/17445760.2016.1170831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T19:45:26Z","timestamp":1692301526000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.tandfonline.com\/doi\/full\/10.1080\/17445760.2016.1170831"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,26]]},"references-count":34,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,5,6]]},"published-print":{"date-parts":[[2017,11,2]]}},"alternative-id":["10.1080\/17445760.2016.1170831"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1080\/17445760.2016.1170831","relation":{},"ISSN":["1744-5760","1744-5779"],"issn-type":[{"type":"print","value":"1744-5760"},{"type":"electronic","value":"1744-5779"}],"subject":[],"published":{"date-parts":[[2016,4,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}