{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:00:11Z","timestamp":1725490811044},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,11]]},"DOI":"10.1109\/glocom.2006.234","type":"proceedings-article","created":{"date-parts":[[2007,4,24]],"date-time":"2007-04-24T20:04:23Z","timestamp":1177445063000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["NETp1-08: Requirements and Challenges in the Design of Privacy-aware Sensor Networks"],"prefix":"10.1109","author":[{"given":"Efthimia","family":"Aivaloglou","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Charalabos","family":"Skianis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"17","article-title":"Moca: Mobile certificate authority for wireless ad hoc networks","author":"yi","year":"2003","journal-title":"Proceedings of 2nd Annual PKI Research Workshop"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015056"},{"key":"14","article-title":"PIKE: Peer intermediaries for key establishment in sensor networks","author":"chan","year":"2005","journal-title":"Proceedings of IEEE Infocom"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"21","first-page":"163","article-title":"Privacyaware location sensor networks","author":"gruteser","year":"2003","journal-title":"Proc Workshop Hot Topics in Operating Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168641"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1236475"},{"key":"24","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/AINA.2005.60","article-title":"A scheme for testing privacy state in pervasive sensor networks","author":"sang","year":"2005","journal-title":"Proc 19th Int Conf Advanced Information Networking and Applications"},{"key":"25","first-page":"237","article-title":"A privacy awareness system for ubiquitous computing environments","author":"langheinrich","year":"2002","journal-title":"Proc Int Conf Ubiquitous Computing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.57"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258475"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301328"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(04)00014-7"},{"year":"0","key":"2"},{"key":"10","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"7","first-page":"245","article-title":"ISDN-MIXES - Untraceable communication with very small bandwidth overhead","author":"pfitzmann","year":"1991","journal-title":"Proceedings of the 7th IFIP International Conference on Information Security"},{"key":"6","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Proc 1st Int Workshop on Information Hiding"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.388"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1108\/09685220410542615"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"}],"event":{"name":"IEEE Globecom 2006","start":{"date-parts":[[2006,11,27]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2006,12,1]]}},"container-title":["IEEE Globecom 2006"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/4150629\/4150630\/04150864.pdf?arnumber=4150864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:41:03Z","timestamp":1602686463000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/4150864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11]]},"references-count":29,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/glocom.2006.234","relation":{},"ISSN":["1930-529X"],"issn-type":[{"type":"print","value":"1930-529X"}],"subject":[],"published":{"date-parts":[[2006,11]]}}}