{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:59:50Z","timestamp":1725469190344},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540380917"},{"type":"electronic","value":"9783540380924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11833529_94","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:33:11Z","timestamp":1156519991000},"page":"924-935","source":"Crossref","is-referenced-by-count":0,"title":["Context-Enhanced Authentication for Infrastructureless Network Environments"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Wishart","sequence":"first","affiliation":[]},{"given":"Jadwiga","family":"Indulska","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Portmann","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Sutton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"94_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Neuman","year":"1994","unstructured":"Neuman, B., Ts\u2019o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications\u00a032(9), 33\u201338 (1994)","journal-title":"IEEE Communications"},{"issue":"11","key":"94_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1989","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1989)","journal-title":"Communications of the ACM"},{"key":"94_CR3","unstructured":"Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002, pp. 567\u2013574 (2002)"},{"key":"94_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/3-540-46877-3_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"I. Ingemarsson","year":"1991","unstructured":"Ingemarsson, I., Simmons, G.: A Protocol to Set Up Shared Secret Schemes Without the Assitance of a Mutually Trusted Third Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 266\u2013282. Springer, Heidelberg (1991)"},{"key":"94_CR5","first-page":"427","volume-title":"Proceedings of the 28th Annual Symposium on the Foundations of Computer Science","author":"P. Feldman","year":"1987","unstructured":"Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: Proceedings of the 28th Annual Symposium on the Foundations of Computer Science, pp. 427\u2013437. IEEE, Los Alamitos (1987)"},{"key":"94_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Hertzberg","year":"1995","unstructured":"Hertzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"key":"94_CR7","unstructured":"Pirzada, A., McDonald, C.: Kerberos Assisted Authentication in Mobile Ad Hoc Networks. In: 27th Australiasian Computer Science Conference (2004)"},{"issue":"6","key":"94_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Networks\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Networks"},{"key":"94_CR9","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., Yi, J.: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. In: IEEE Conference on Networking Protocols (ICNP) (2005)","DOI":"10.1109\/ICNP.2005.14"},{"issue":"6","key":"94_CR10","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/TNET.2004.838598","volume":"12","author":"H. Luo","year":"2004","unstructured":"Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE\/ACM Transactions on Networking\u00a012(6), 1049\u20131063 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"94_CR11","doi-asserted-by":"crossref","unstructured":"Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2005), pp. 59\u201364 (2005)","DOI":"10.1109\/WIOPT.2005.42"},{"key":"94_CR12","unstructured":"Covington, M.: A Flexible Security Architecture for Pervasive Computing Environments. PhD thesis, College of Computing, Georgia Institute of Technology (2004)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11833529_94.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:25Z","timestamp":1619507665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11833529_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540380917","9783540380924"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11833529_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}