{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:08:05Z","timestamp":1742389685397},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_14","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"119-133","source":"Crossref","is-referenced-by-count":15,"title":["Exploiting Empirical Engagement in Authentication Protocol Design"],"prefix":"10.1007","author":[{"given":"Sadie","family":"Creese","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard","family":"Harrison","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bill","family":"Roscoe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul","family":"Whittaker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Irfan","family":"Zakiuddin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"17","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Ginzboorg, P.: Key-agreement in ad-hoc networks. Computer Communications\u00a023(17), 1627\u20131637 (2000)","journal-title":"Computer Communications"},{"key":"14_CR2","unstructured":"Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California, (Feburary 2002)"},{"key":"14_CR3","unstructured":"Creese, S., Goldsmith, M.H., Roscoe, B., Zakiuddin, I.: The attacker in ubiquitous computing environments: Formalising the threat model. In: T. Dimitrakos, F. Martinelli (eds.), Workshop on Formal Aspects in Security and Trust, Pisa, Italy, IIT-CNR Technical Report (September 2003)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"14_CR5","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice Hall International, Englewood Cliffs (1985)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/10958513_4","volume-title":"Information Security","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 44\u201353. Springer, Heidelberg (2003)"},{"key":"14_CR7","first-page":"565","volume-title":"The Theory and Practice of Concurrency","author":"A.W. Roscoe","year":"1998","unstructured":"Roscoe, A.W.: The Theory and Practice of Concurrency , p.xv+ 565. Prentice-Hall, Englewood Cliffs (1998) ISBN 0-13-6774409-5"},{"key":"14_CR8","volume-title":"The Modelling and Analysis of Security Protocols: the CSP Approach","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A., Schneider, S.A., Goldsmith, M.H., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, Reading (2001)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","first-page":"172","volume-title":"Security Protocols, 7th International Workshop Proceedings","author":"F. Stajano","year":"1999","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols, 7th International Workshop Proceedings LNCS, pp. 172\u2013194. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:45:29Z","timestamp":1620013529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}