{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T13:01:25Z","timestamp":1748350885226,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/trustcom.2016.0114","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:44:06Z","timestamp":1486676646000},"page":"590-597","source":"Crossref","is-referenced-by-count":21,"title":["Data Sharing in Secure Multimedia Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Usman","sequence":"first","affiliation":[]},{"given":"Mian Ahmad","family":"Jan","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.6852000"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2366511"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.02.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2014.2299371"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2481366"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2292883"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PCS.2015.7170081"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1422-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.02.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.12.007"},{"journal-title":"Location-based key management strong against insider threats in wireless sensor networks","year":"0","author":"choi","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2537200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2429582"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.05.005"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TIFS.2014.2364679","article-title":"An authenticated trust and reputation calculation and management system for cloud and sensor networks integration","volume":"10","author":"zhu","year":"2015","journal-title":"Information Forensics and Security IEEE Transactions on"},{"journal-title":"Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks","year":"0","author":"chu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.41"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.07.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.06.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.02.019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2014.2324279"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"journal-title":"Energy-efficient routing and secure communication in wireless sensor networks","year":"2016","author":"jan","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.09.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2437331"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.03.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2015.2389038"},{"journal-title":"A survey of public-key cryptographic primitives issues in wireless sensor networks","year":"0","author":"shim","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2409057"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1021-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2346764"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"journal-title":"Seamless streaming data delivery in cluster-based wireless sensor networks with mobile elements","year":"0","author":"cheng","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2478469"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2331916"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2268897"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38401-1_12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2313887"},{"year":"0","key":"ref44","article-title":"Lotus mote, multimedia wireless sensor node"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9235-0"},{"year":"0","key":"ref43","article-title":"Hm 16.6, a test model of h.265\/hevc standard"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.198"}],"event":{"name":"2016 IEEE Trustcom\/BigDataSE\/I\u200bSPA","start":{"date-parts":[[2016,8,23]]},"location":"Tianjin, China","end":{"date-parts":[[2016,8,26]]}},"container-title":["2016 IEEE Trustcom\/BigDataSE\/ISPA"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7845250\/7846883\/07846997.pdf?arnumber=7846997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T10:13:28Z","timestamp":1498385608000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7846997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2016.0114","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}