Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks | IEEE Conference Publication | IEEE Xplore