{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:07Z","timestamp":1725902947891},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_57","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"580-589","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Authentication for Distributed Mobile P2P Communications"],"prefix":"10.1007","author":[{"given":"Jiyoung","family":"Lim","sequence":"first","affiliation":[]},{"given":"Inshil","family":"Doh","sequence":"additional","affiliation":[]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"57_CR1","unstructured":"An, J., Lee, J., Kim, A., Lee, S.: User Authentication Scheme for Mobile Banking using Visual Cryptography. Korea Computer Congress (2013)"},{"issue":"4","key":"57_CR2","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1023\/A:1027399908231","volume":"21","author":"R Ghanea-Hercock","year":"2003","unstructured":"Ghanea-Hercock, R.: Authentication with P2P agents. BT Technol. J. 21(4), 146\u2013152 (2003)","journal-title":"BT Technol. J."},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Kreitz, G., Bodriagov, O., Greschbach, B., Rodr\u00edguez-Cano, G., Buchegger, S.: Passwords in peer-to-peer. In: IEEE 12th International Conference on Peer-to-Peer Computing (P2P) (2012)","DOI":"10.1109\/P2P.2012.6335797"},{"key":"57_CR4","unstructured":"Lim, J., Doh, I., Chae, K.: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (2016)"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Mondal, A. Madria. S.K., Kitsuregawa, M.: CLEAR: an efficient context and location-based dynamic replication scheme for mobile-P2P networks. In: International Conference on Database and Expert Systems Applications (2006)","DOI":"10.1007\/11827405_39"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Mowla, N., Doh, I., Chae, K.: An efficient defense mechanism for spoofed IP attack in SDN based CDNi. In: International Conference on Information Networking (2015)","DOI":"10.1109\/ICOIN.2015.7057863"},{"issue":"6","key":"57_CR7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9(6), 24\u201334 (2005)","journal-title":"IEEE Internet Comput."},{"key":"57_CR8","unstructured":"Takeda, A., Chakraborty, D., Kitagata, G., Hashimoto, K., Shiratori, N.: A new scalable distributed authentication for P2P network and its performance evaluation. In: 12th WSEAS International Conference on COMPUTERS (2008)"},{"issue":"Suppl. 1","key":"57_CR9","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/S1005-8885(10)60212-9","volume":"18","author":"H Xu","year":"2011","unstructured":"Xu, H., Wang, S., Wand, R., Wang, Z.: Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm. J. China Univ. Posts Telecommun. 18(Suppl. 1), 40\u201347 (2011)","journal-title":"J. China Univ. Posts Telecommun."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:25:13Z","timestamp":1499142313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}