{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T13:40:42Z","timestamp":1735998042276,"version":"3.32.0"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387239934"},{"type":"electronic","value":"9780387240435"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/0-387-24043-8_22","type":"book-chapter","created":{"date-parts":[[2005,9,21]],"date-time":"2005-09-21T18:15:59Z","timestamp":1127326559000},"page":"225-236","source":"Crossref","is-referenced-by-count":5,"title":["Middleware Services for Information Sharing in Mobile Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Plagemann","sequence":"first","affiliation":[]},{"given":"Jon","family":"Andersson","sequence":"additional","affiliation":[]},{"given":"Ovidiu","family":"Drugan","sequence":"additional","affiliation":[]},{"given":"Vera","family":"Goebel","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Griwodz","sequence":"additional","affiliation":[]},{"given":"P\u00e5l","family":"Halvorsen","sequence":"additional","affiliation":[]},{"given":"Ellen","family":"Munthe-Kaas","sequence":"additional","affiliation":[]},{"given":"Matija","family":"Puzar","sequence":"additional","affiliation":[]},{"given":"Norun","family":"Sanderson","sequence":"additional","affiliation":[]},{"given":"Katrine Stemland","family":"Skjelsvik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Alves-Foss, J., An Efficient Secure Authenticated Group Key Exchange Algorithm for Large And Dynamic Groups, Proceedings of the 23rd National Information Systems Security Conference, pages 254\u2013266, October 2000"},{"key":"22_CR2","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume":"2248","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case (Extended Abstract), Advances in Cryptology-Proceedings of AsiaCrypt 2001, pages 290\u2013309. LNCS, Vol. 2248, 2001","journal-title":"Advances in Cryptology-Proceedings of AsiaCrypt 2001"},{"key":"22_CR3","unstructured":"Caporuscio, M., Inverardi, P., Pelliccione, P., Formal analysis of clients mobility in the Siena publish\/subscribe middleware, Technical report, Department of Computer Science, University of L'Aquila, October 2002"},{"key":"22_CR4","first-page":"49","volume":"21","author":"K. Chen","year":"2002","unstructured":"Chen, K., Shah, S.H., Nahrstedt, K., Cross-Layer Design for Data Accessibility in Mobile Ad hoc Networks, Journal of Wireless Personal Communications, Special Issue on Multimedia Network Protocols and Enabling Radio Technologies, Kluwer Academic Publishers, Vol. 21, 2002, pp. 49\u201375","journal-title":"Journal of Wireless Personal Communications, Special Issue on Multimedia Network Protocols and Enabling Radio Technologies"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Cugola, G., Di Nitto, T., and Fuggetta, A., The JEDI event-based infrastructure and its application to the development of the OPSS WFMS, IEEE Transactions on Software Engineering, 27(9), 2001","DOI":"10.1109\/32.950318"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Mancini, L., Jajodia, S., Efficient and Secure Keys Management for Wireless Mobile Communications, Proceedings of the second ACM international workshop on Principles of mobile computing, pages 66\u201373, ACM Press, 2002","DOI":"10.1145\/584490.584504"},{"key":"22_CR7","unstructured":"Fiege, L., Zeidler, A., Gartner, F.C., Handurukande, S.B., Dealing with Uncertainty in Mobile Publish\/Subscribe Middleware, Proceedings of 1st International Workshop on Middleware for Pervasive and Ad-hoc Computing, 2003, pp. 60\u201367"},{"key":"22_CR8","unstructured":"Fontijn, W., Boncz, P., Ambient DB:-P2P Data Management Middleware for Ambient Intelligence, accepted for publication in the PERWARE04 Workshop (co-located with PERCOM 2004)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Huang Y., Garcia-Molina H., Publish\/subscribe in a mobile environment, Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (mobiDE01), Santa Barbara, CA, May 2001","DOI":"10.1145\/376868.376889"},{"key":"22_CR10","unstructured":"K\u00e4rpijoki, V., Security in Ad Hoc Networks, Tik-110.501, Seminar on Network Security, HUT TML 2000"},{"issue":"10","key":"22_CR11","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/JSAC.2003.815964","volume":"21","author":"B. Li","year":"2003","unstructured":"Li, B., Wang. K. H., Nonstop: Continuous multimedia streaming in wireless ad hoc networks with node mobility, IEEE Journal on Selected Areas in Communications, December 2003, 21(10), pp. 1627\u20131641.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Meier, R., Cahill, V., STEAM: Event-Based Middleware for Wireless Ad Hoc Networks, Proceedings of the International Workshop on Distributed Event-Based Systems (ICDCS\/DEBS'02), 2002, pp. 639\u2013644","DOI":"10.1109\/ICDCSW.2002.1030841"},{"key":"22_CR13","unstructured":"Montenegro, G., Castelluccia, C, Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses, NDSS'02, February 2002"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Perich, F., Avancha, S., Chakraborty, D., Joshi, A., Yesha, Y., Profile Driven Data Management for Pervasive Environments, Proceedings 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002","DOI":"10.1007\/3-540-46146-9_36"},{"key":"22_CR15","unstructured":"Schwotzer, T., Geihs, K., Shark-a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups, Proceedings 2nd International Conference on Knowledge Management (I-KNOW '02), Graz, Austria, July 2002, pp. 149\u2013156"}],"container-title":["IFIP International Federation for Information Processing","Broadband Satellite Comunication Systems and the Challenges of Mobility"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24043-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T13:13:46Z","timestamp":1735996426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24043-8_22"}},"subtitle":["Challenges and Approach"],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9780387239934","9780387240435"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/0-387-24043-8_22","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2005]]}}}