{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:21Z","timestamp":1725544581401},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_3","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"18-31","source":"Crossref","is-referenced-by-count":4,"title":["Enabling Secure Discovery in a Pervasive Environment"],"prefix":"10.1007","author":[{"given":"Slim","family":"Trabelsi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Christophe","family":"Pazzaglia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yves","family":"Roudier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Zhu, F., Mutka, M., Ni, L.: Classification of Service Discovery in Pervasive Computing Environments. MSU-CSE-02-24, Michigan State university, East Lansing (2002)"},{"key":"3_CR2","unstructured":"Bussard, L., Roudier, Y.: Embedding Distance Bounding Protocols within Intuitive Interactions. In: 1st International Conference on Security in Pervasive Computing, SPC 2003, Boppard, Germany, March 12-13 (2003)"},{"key":"3_CR3","unstructured":"OASIS, WS-Discovery, \n                    \n                      http:\/\/msdn.microsoft.com\/ws\/2004\/10\/ws-discovery\/"},{"key":"3_CR4","unstructured":"Kagal, L.: Rei: A Policy Language for the Me-Centric Project. HP Technical Report (2002)"},{"key":"3_CR5","unstructured":"OASIS, WS-Policy Specifications, \n                    \n                      http:\/\/msdn.microsoft.com\/webservices\/default.aspx?pull=\/library\/en-s\/dnglobspec\/html\/ws-policy1202.asp"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-540-30581-1_4","volume-title":"Semantic Web Services and Web Process Composition","author":"D. Martin","year":"2005","unstructured":"Martin, D., et al.: Bringing Semantics to Web Services: The OWL-S Approach. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol.\u00a03387, pp. 26\u201342. Springer, Heidelberg (2005)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Czerwinski, S., et al.: An architecture for a Secure Service Discovery Service. In: Proceedings of Mobicom 1999, Seattle, USA (1999)","DOI":"10.1145\/313451.313462"},{"key":"3_CR8","unstructured":"Almenarez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and IFIP Workshop on Next Generation Networks, Budapest (2003)"},{"key":"3_CR9","first-page":"235","volume-title":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (Percom 2003)","author":"F. Zhu","year":"2003","unstructured":"Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (Percom 2003), pp. 235\u2013242. IEEE Computer Society, Los Alamitos (2003)"},{"key":"3_CR10","unstructured":"MOSQUITO Project IST 004636, \n                    \n                      https:\/\/www.mosquito-online.org\/"},{"key":"3_CR11","unstructured":"Ghader, M., et al.: Secure resource and service discovery in personal networks. Wireless World Research Forum Meeting #12, Canada, November 4-5 (2004)"},{"key":"3_CR12","unstructured":"Zhu, F., Mutka, M., Ni, L.: Prudent exposure: A private and user centric service discovery protocol. In: Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), Orlando, USA (2004)"},{"key":"3_CR13","unstructured":"SUN Microsystems, Jini Specifications, \n                    \n                      http:\/\/java.sun.com\/products\/jini\/"},{"key":"3_CR14","unstructured":"OASIS, UDDI, \n                    \n                      http:\/\/www.uddi.org"},{"key":"3_CR15","unstructured":"Garofalakis, O., et al.: Web Service Discovery Mechanisms: Looking for a Needle in a Haystack?\u201d. In: 15th ACM Conference on Hypertext and Hypermedia (Hypertext 2004), Santa Cruz, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T04:30:46Z","timestamp":1552365046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11734666_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}