{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:38Z","timestamp":1725558938627},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_7","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"56-62","source":"Crossref","is-referenced-by-count":1,"title":["Security Issues for Pervasive Personalized Communication Systems"],"prefix":"10.1007","author":[{"given":"Bertin","family":"Klein","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tristan","family":"Miller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sandra","family":"Zilles","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Brown, P., Burleson, W., Lamming, M., Rahlff, O.-W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (2000)"},{"issue":"8","key":"7_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2002.1023788","volume":"35","author":"G. Cybenko","year":"2002","unstructured":"Cybenko, G., Giani, A., Thompson, P.: Cognitive hacking: A battle for the mind. IEEE Computer\u00a035(8), 50\u201356 (2002)","journal-title":"IEEE Computer"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b96922","volume-title":"Pervasive Computing","author":"A. Ferscha","year":"2004","unstructured":"Ferscha, A., Hechinger, M., Mayrhofer, R., Rocha, M.d.S., Franz, M., Oberhauser, R.: Digital aura. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001. Springer, Heidelberg (2004)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/ICDCSW.2004.1284082","volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems Workshops","author":"A. Ferscha","year":"2004","unstructured":"Ferscha, A., Hechinger, M., Mayrhofer, R., Oberhauser, R.: A light-weight component model for peer-to-peer applications. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 520\u2013527. IEEE Computer Society, Los Alamitos (2004)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing (revised papers)","year":"2004","unstructured":"Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.): Security in Pervasive Computing (revised papers). LNCS, vol.\u00a02802. Springer, Heidelberg (2004)"},{"key":"7_CR6","unstructured":"Klein, B., Agne, S., Ebert, A., Bender, M.: Enabling flow: A paradigm for document-centered personal information spaces. In: Proceedings of the 8th IASTED International Conference on Artificial Intelligence and Soft Computing (2004)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kvarnstr\u00f6m, H., Hedbom, H., Jonsson, E.: Protecting security policies in ubiquitous environments using one-way functions. In: Hutter et al.[5], pp. 71\u201385","DOI":"10.1007\/978-3-540-39881-3_9"},{"key":"7_CR8","unstructured":"PAMPAS consortium and constituency. Deliverable D04: Final roadmap (extended version). Technical Report IST-201-37763, PAMPAS consortium (2004)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Robinson, P., Beigl, M.: Trust context spaces: An infrastructure for pervasive security in context-aware environments. In: Hutter et al.[5],pp. 157\u2013172","DOI":"10.1007\/978-3-540-39881-3_15"},{"key":"7_CR10","unstructured":"Smith, I., LaMarca, A., Consolvo, S., Dourish, P.: A social approach to privacy in location-enhanced computing. In: Proceedings of the Workshop on Security and Privacy in Pervasive Computing (2004)"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1147\/sj.384.0693","volume":"38","author":"M. Weiser","year":"1999","unstructured":"Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at PARC in the late 1980s. IBM Systems Journal\u00a038(4), 693\u2013696 (1999)","journal-title":"IBM Systems Journal"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:55Z","timestamp":1605760435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}