{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:48:09Z","timestamp":1762505289401,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748526"},{"type":"electronic","value":"9783540748533"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74853-3_5","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T17:10:31Z","timestamp":1189703431000},"page":"73-90","source":"Crossref","is-referenced-by-count":18,"title":["Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Leung","sequence":"first","affiliation":[]},{"given":"Chris J.","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMC.2006.26","volume":"5","author":"D. Chakraborty","year":"2006","unstructured":"Chakraborty, D., Joshi, A., Yesha, Y., Finin, T.: Toward distributed service discovery in pervasive computing environments. IEEE Transactions on Mobile Computing\u00a05(2), 97\u2013112 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1023\/B:WINE.0000044024.54833.cb","volume":"10","author":"A. Friday","year":"2004","unstructured":"Friday, A., Davies, N., Wallbank, N., Catterall, E., Pink, S.: Supporting service discovery, querying and interaction in ubiquitous computing environments. Wireless Networks\u00a010(6), 631\u2013641 (2004)","journal-title":"Wireless Networks"},{"issue":"4","key":"5_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MPRV.2005.87","volume":"4","author":"F. Zhu","year":"2005","unstructured":"Zhu, F., Mutka, M., Li, L.: Service discovery in pervasive computing environements. IEEE Pervasive Computing\u00a04(4), 81\u201390 (2005)","journal-title":"IEEE Pervasive Computing"},{"issue":"4","key":"5_CR4","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TMC.2006.1599409","volume":"5","author":"F. Zhu","year":"2006","unstructured":"Zhu, F., Mutka, M., Ni, L.: A private, secure and user-centric information exposure model for service discovery protocols. IEEE Transactions on Mobile Computing\u00a05(4), 418\u2013429 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"5_CR5","first-page":"225","volume-title":"3rd IEEE Conf. on Pervasive Computing & Communications","author":"F. Zhu","year":"2005","unstructured":"Zhu, F., Zhu, W., Mutka, M.W., Ni, L.: Expose or not? A progressive exposure approach for service discovery in pervasive computing environments. In: 3rd IEEE Conf. on Pervasive Computing & Communications, pp. 225\u2013234. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"5_CR6","first-page":"46","volume-title":"IEEE Symposium on Security and Privacy","author":"D. Gollmann","year":"1996","unstructured":"Gollmann, D.: What do we mean by entity authentication? In: IEEE Symposium on Security and Privacy, pp. 46\u201354. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-39881-3_12","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2004","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 116\u2013129. Springer, Heidelberg (2004)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/3-540-45600-7_23","volume-title":"Information and Communications Security","author":"F. Bao","year":"2001","unstructured":"Bao, F., Deng, R.H.: Privacy protection for transactions of digital goods. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 202\u2013213. Springer, Heidelberg (2001)"},{"issue":"4","key":"5_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM\u00a048(4), 101\u2013106 (2005)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Int\u2019l Symposium on Software Security, pp. 1\u201315 (2002)","key":"5_CR10","DOI":"10.1007\/3-540-36532-X_1"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","first-page":"71","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Wu","year":"2002","unstructured":"Wu, M., Friday, A.: Integrating privacy enhancing services in ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, p. 71. Springer, Heidelberg (2002)"},{"unstructured":"Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G.: Trusted Computing Platforms: TCPA Technology in Context. In: PH PTR, Upper Saddle River, NJ (2003)","key":"5_CR12"},{"volume-title":"Trusted Computing","year":"2005","unstructured":"Mitchell, C.J. (ed.): Trusted Computing. IEE Press, London (2005)","key":"5_CR13"},{"unstructured":"Trusted Computing Group (TCG): TCG Specification Architecture Overview. Version 1.2, The Trusted Computing Group, Portland, Oregon, USA (2004)","key":"5_CR14"},{"unstructured":"National Institute of Standards and Technology (NIST): Secure Hash Standard. Federal information processing standards publication (FIPS), pp. 180\u2013182 (2002)","key":"5_CR15"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"11th ACM Conf. on Computer & Communications Security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: 11th ACM Conf. on Computer & Communications Security, pp. 132\u2013145. ACM Press, New York (2004)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 268\u2013289. Springer, Heidelberg (2003)"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM\u00a038(3), 690\u2013728 (1991)","journal-title":"Journal of the ACM"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing\u00a018(1), 186\u2013208 (1989)","journal-title":"SIAM Journal on Computing"},{"unstructured":"Trusted Computing Group (TCG): TPM v1.2 Specification Changes. A summary of changes, Trusted Computing Group, Portland, Oregon, USA (2003)","key":"5_CR20"},{"doi-asserted-by":"crossref","unstructured":"Rudolph, C.: Covert identity information in direct anonymous attestation (DAA). In: 22nd IFIP Int\u2019l. Information Security Conf (SEC 2007) (2007)","key":"5_CR21","DOI":"10.1007\/978-0-387-72367-9_38"},{"unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure. RFC 3280, The Internet Engineering Task Force (IETF) (2002)","key":"5_CR22"},{"issue":"6","key":"5_CR23","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Sun Microsystems: Jini Architecture Specification. Version 1.2, Sun Microsystems, Palo Alto, CA, USA (2001), http:\/\/www.sun.com\/software\/jini\/specs\/","key":"5_CR24"},{"unstructured":"Universal Plug and Play (UPnP) Forum: UPnP Device Architecture. version 1.0 (2003), http:\/\/www.upnp.org\/","key":"5_CR25"},{"doi-asserted-by":"crossref","unstructured":"Guttman, E., Perkins, C., Veizades, J., Day, M.: Service Location Protocol, Version 2., RFC 2608, The Internet Engineering Task Force (IETF) (1999)","key":"5_CR26","DOI":"10.17487\/rfc2608"},{"issue":"4","key":"5_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/98.944002","volume":"8","author":"M. Nidd","year":"2001","unstructured":"Nidd, M.: Service discovery in DEAPspace. IEEE Personal Communications\u00a08(4), 39\u201345 (2001)","journal-title":"IEEE Personal Communications"},{"unstructured":"Salutation Consortium: Salutation Architecture Specification (1999), http:\/\/www.salutation.org\/","key":"5_CR28"},{"doi-asserted-by":"crossref","unstructured":"Zhu, F., Mutka, M., Ni, L.: Prudent Exposure: A private and user-centric service discovery protocol. In: 2nd IEEE Conf. on Pervasive Computing & Communications, pp. 329\u2013328. IEEE Computer Society Press, Los Alamitos (2004)","key":"5_CR29","DOI":"10.1109\/PERCOM.2004.1276870"},{"issue":"3","key":"5_CR30","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.tcs.2003.12.023","volume":"322","author":"M. Abadi","year":"2004","unstructured":"Abadi, M., Fournet, C.: Private authentication. Theoretical Computer Science\u00a0322(3), 427\u2013476 (2004)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","volume":"55","author":"K. Ren","year":"2006","unstructured":"Ren, K., Luo, W., Kim, K., Deng, R.: A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology\u00a055(4), 1373\u20131384 (2006)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-540-30539-2_22","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"I. Teranishi","year":"2004","unstructured":"Teranishi, I., Furukawa, J., Sako, K.: k-times anonymous authentication. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 308\u2013322. Springer, Heidelberg (2004)"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/11861386_36","volume-title":"Security Protocols","author":"P.D. Chowdhury","year":"2006","unstructured":"Chowdhury, P.D., Christianson, B., Malcolm, J.: Anonymous authentication. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a03957, pp. 299\u2013305. Springer, Heidelberg (2006)"},{"unstructured":"Trusted Computing Platform Alliance (TCPA): TCPA Main Specification. Version 1.1b, Trusted Computing Group, Portland, Oregon, USA (2002)","key":"5_CR34"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2007: Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74853-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:57:22Z","timestamp":1737417442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74853-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748526","9783540748533"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74853-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}