{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:25:27Z","timestamp":1725567927331},"publisher-location":"Berlin, Heidelberg","reference-count":57,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642167928"},{"type":"electronic","value":"9783642167935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16793-5_10","type":"book-chapter","created":{"date-parts":[[2010,10,14]],"date-time":"2010-10-14T17:05:35Z","timestamp":1287075935000},"page":"207-233","source":"Crossref","is-referenced-by-count":4,"title":["Multilaterally Secure Ubiquitous Auditing"],"prefix":"10.1007","author":[{"given":"Stefan G.","family":"Weber","sequence":"first","affiliation":[]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption (1998), http:\/\/www.cdt.org\/crypto\/risks98\/"},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.pmcj.2007.04.002","volume":"3","author":"E. Aitenbichler","year":"2007","unstructured":"Aitenbichler, E., Kangasharju, J., M\u00fchlh\u00e4user, M.: MundoCore: A Light-Weight Infrastructure for Pervasive Computing. Pervasive and Mobile Computing\u00a03(4), 332\u2013361 (2007)","journal-title":"Pervasive and Mobile Computing"},{"key":"10_CR3","volume-title":"Security Engineering: a Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2008","unstructured":"Anderson, R.J.: Security Engineering: a Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2008)"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"02","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a002(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"10_CR5","first-page":"71","volume-title":"ACM Conference on Computer and Communications Security","author":"J. Biskup","year":"2000","unstructured":"Biskup, J., Flegel, U.: Threshold-Based Identity Recovery for Privacy Enhanced Applications. In: ACM Conference on Computer and Communications Security, pp. 71\u201379. ACM, New York (2000)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/3-540-39945-3_3","volume-title":"Recent Advances in Intrusion Detection","author":"J. Biskup","year":"2000","unstructured":"Biskup, J., Flegel, U.: Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 28\u201348. Springer, Heidelberg (2000)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Burmester, M., Desmedt, Y., Wright, R.N., Yasinsac, A.: Accountable Privacy. In: Security Protocols Workshop 2004, pp. 83\u201395. Springer, Heidelberg (2004)","DOI":"10.1007\/11861386_10"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MTAS.2005.1407744","volume":"24","author":"J. Cas","year":"2005","unstructured":"Cas, J.: Privacy in Pervasive Computing Environments - A Contradiction in Terms? IEEE Technology and Society Magazine\u00a024(1), 24\u201333 (2005)","journal-title":"IEEE Technology and Society Magazine"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damgard, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/11426646_27","volume-title":"Location- and Context-Awareness","author":"C. Delakouridis","year":"2005","unstructured":"Delakouridis, C., Kazatzopoulos, L., Marias, G.F., Georgiadis, P.: Share The Secret: Enabling Location Privacy in Ubiquitous Environments. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol.\u00a03479, pp. 289\u2013305. Springer, Heidelberg (2005)"},{"key":"10_CR15","first-page":"34","volume-title":"Dynamic & Mobile GIS: Investigating Change in Space and Time","author":"M. Duckham","year":"2006","unstructured":"Duckham, M., Kulik, L.: Location Privacy and Location-Aware Computing. In: Dynamic & Mobile GIS: Investigating Change in Space and Time, pp. 34\u201351. CRC Press, Boca Raton (2006)"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR17","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc., Chichester (2003)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Fischer-H\u00fcbner, S.: Pseudonymity. In: Encyclopedia of Database Systems, p. 2207 (2009)","DOI":"10.1007\/978-0-387-39940-9_1490"},{"key":"10_CR20","volume-title":"Workshop on Computer Architectures to Support Security and Persistance of Information","author":"S. Fischer-H\u00fcbner","year":"1990","unstructured":"Fischer-H\u00fcbner, S., Brunnstein, K.: Combining Verified and Adaptive System Components Towards More Secure System Architectures. In: Workshop on Computer Architectures to Support Security and Persistance of Information. Springer, Heidelberg (1990)"},{"key":"10_CR21","volume-title":"Privacy-Respecting Intrusion Detection","author":"U. Flegel","year":"2007","unstructured":"Flegel, U.: Privacy-Respecting Intrusion Detection. Springer, Heidelberg (2007)"},{"key":"10_CR22","first-page":"324","volume-title":"ACM Conference on Computer and Communications Security","author":"J. Freudiger","year":"2009","unstructured":"Freudiger, J., Manshaei, M.H., Hubaux, J.-P., Parkes, D.C.: On Non-Cooperative Location Privacy: a Game-Theoretic Analysis. In: ACM Conference on Computer and Communications Security, pp. 324\u2013337. ACM, New York (2009)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/3-540-44647-8_22","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"J. Furukawa","year":"2001","unstructured":"Furukawa, J., Sako, K.: An Efficient Scheme for Proving a Shuffle. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 368\u2013387. Springer, Heidelberg (2001)"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing\u00a018(1), 186\u2013208 (1989)","journal-title":"SIAM Journal on Computing"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1378600.1378607","volume-title":"Conference on Mobile Systems, Applications, and Services (MobiSys 2008)","author":"B. Greenstein","year":"2008","unstructured":"Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. In: Conference on Mobile Systems, Applications, and Services (MobiSys 2008), pp. 40\u201353. ACM, New York (2008)"},{"issue":"3","key":"10_CR26","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11036-005-6425-1","volume":"10","author":"M. Gruteser","year":"2005","unstructured":"Gruteser, M., Grunwald, D.: Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: a Quantitative Analysis. Mob. Netw. Appl.\u00a010(3), 315\u2013325 (2005)","journal-title":"Mob. Netw. Appl."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Hartmann, M., Austaller, G.: Context Models and Context-Awareness. In: Ubiquitous Computing Technology for Real Time Enterprises, pp. 235\u2013256. IGI Global Publisher (2008)","DOI":"10.4018\/978-1-59904-832-1.ch011"},{"key":"10_CR28","unstructured":"Heinemann, A.: Collaboration in opportunistic networks. Ph.D. thesis, Technische Universit\u00e4t Darmstadt (2007)"},{"key":"10_CR29","volume-title":"Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004)","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. In: Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004). IEEE Computer Society, Los Alamitos (2004)"},{"key":"10_CR30","unstructured":"Hirt, M.: Multi-party computation: Efficient protocols, general adversaries, and voting. Ph.D. thesis, ETH Zurich (September 2001), ftp:\/\/ftp.inf.ethz.ch\/pub\/crypto\/publications\/Hirt01.pdf"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-44448-3_13","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Jakobsson","year":"2000","unstructured":"Jakobsson, M., Juels, A.: Mix and Match: Secure Function Evaluation via Ciphertexts (Extended Abstract). In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 162\u2013177. Springer, Heidelberg (2000)"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"10_CR33","first-page":"39","volume-title":"IFIP International Information Security Conference (SEC 1996)","author":"D. Kesdogan","year":"1996","unstructured":"Kesdogan, D., Federrath, H., Jerichow, A., Pfitzmann, A.: Location Management Strategies Increasing Privacy in mobile Communication. In: IFIP International Information Security Conference (SEC 1996), pp. 39\u201348. Chapman & Hall, Boca Raton (1996)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Koeune, F.: Pseudo-Random Number Generator. In: Encyclopedia of Cryptography and Security, pp. 485\u2013487 (2005)","DOI":"10.1007\/0-387-23483-7_330"},{"issue":"01","key":"10_CR35","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v1i1.566","volume":"01","author":"Y. Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. Journal of Privacy and Confidentiality\u00a001(01), 59\u201398 (2009)","journal-title":"Journal of Privacy and Confidentiality"},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1145\/1352533.1352558","volume-title":"Conference on Wireless Network Security (WISEC 2008)","author":"L.A. Martucci","year":"2008","unstructured":"Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-Certified Sybil-Free Pseudonyms. In: Conference on Wireless Network Security (WISEC 2008), pp. 154\u2013159. ACM, New York (2008)"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"M\u00fchlh\u00e4user, M., Gurevych, I. (eds.): Ubiquitous Computing Technology for Real Time Enterprises - Handbook of Research. IGI Global Publisher (2008)","DOI":"10.4018\/978-1-59904-832-1"},{"key":"10_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04559-2_1","volume-title":"Quality of Context","author":"M. M\u00fchlh\u00e4user","year":"2009","unstructured":"M\u00fchlh\u00e4user, M., Hartmann, M.: Interacting with Context. In: Rothermel, K., Fritsch, D., Blochinger, W., D\u00fcrr, F. (eds.) QuaCon 2009. LNCS, vol.\u00a05786, pp. 1\u201314. Springer, Heidelberg (2009)"},{"key":"10_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-48285-7_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C. Park","year":"1994","unstructured":"Park, C., Itoh, K., Kurosawa, K.: Efficient Anonymous Channel and All\/Nothing Election Scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 248\u2013259. Springer, Heidelberg (1994)"},{"key":"10_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party (Extended Abstract). In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 522\u2013526. Springer, Heidelberg (1991)"},{"key":"10_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11766155_1","volume-title":"Emerging Trends in Information and Communication Security","author":"A. Pfitzmann","year":"2006","unstructured":"Pfitzmann, A.: Multilateral Security: Enabling Technologies and Their Evaluation. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 1\u201313. Springer, Heidelberg (2006)"},{"key":"10_CR42","unstructured":"Pfitzmann, A., Hansen, M.: A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. V0.32 (December 2009), http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml"},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/366173.366208","volume-title":"Workshop on New Security Paradigms (NSPW 2000)","author":"K. Rannenberg","year":"2000","unstructured":"Rannenberg, K.: Multilateral Security - a Concept and Examples for Balanced Security. In: Workshop on New Security Paradigms (NSPW 2000), pp. 151\u2013162. ACM, New York (2000)"},{"issue":"1","key":"10_CR44","first-page":"2","volume":"2","author":"M. Satyanarayanan","year":"2003","unstructured":"Satyanarayanan, M.: Privacy: The Achilles Heel of Pervasive Computing? IEEE Pervasive Computing\u00a02(1), 2\u20133 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"10_CR45","unstructured":"Schlott, S.: Privacy- und sicherheitsaspekte in ubiquitaeren umgebungen. Ph.D. thesis, Universit\u00e4t Ulm (2008)"},{"issue":"2","key":"10_CR46","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B. Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J.: Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur.\u00a02(2), 159\u2013176 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"11","key":"10_CR47","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"10_CR48","first-page":"151","volume-title":"IFIP International Information Security Conference (SEC 1997)","author":"M. Sobirey","year":"1997","unstructured":"Sobirey, M., Fischer-H\u00fcbner, S., Rannenberg, K.: Pseudonymous Audit for Privacy Enhanced Intrusion Detection. In: IFIP International Information Security Conference (SEC 1997), pp. 151\u2013163. Chapman & Hall, Boca Raton (1997)"},{"key":"10_CR49","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-0-387-93808-0_11","volume-title":"Handbook of Ambient Intelligence and Smart Environments","author":"F. Stajano","year":"2010","unstructured":"Stajano, F.: Security Issues in Ubiquitous Computing. In: Handbook of Ambient Intelligence and Smart Environments, pp. 281\u2013314. Springer, Heidelberg (2010)"},{"key":"10_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BFb0054019","volume-title":"Public Key Cryptography","author":"Y. Tsiounis","year":"1998","unstructured":"Tsiounis, Y., Yung, M.: On the Security of ElGamal based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 117\u2013134. Springer, Heidelberg (1998)"},{"key":"10_CR51","unstructured":"Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an Encrypted and Searchable Audit Log. In: Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (2004)"},{"key":"10_CR52","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/INCOS.2009.40","volume-title":"Conference on Intelligent Networking and Collaborative Systems (INCoS 2009)","author":"S.G. Weber","year":"2009","unstructured":"Weber, S.G.: Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis. In: Conference on Intelligent Networking and Collaborative Systems (INCoS 2009), pp. 119\u2013126. IEEE Computer Society, Los Alamitos (2009)"},{"key":"10_CR53","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/CONGRESS.2009.11","volume-title":"World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS 2009)","author":"S.G. Weber","year":"2009","unstructured":"Weber, S.G.: Securing First Response Coordination with Dynamic Attribute-Based Encryption. In: World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS 2009), pp. 58\u201369. IEEE Computer Society, Los Alamitos (2009)"},{"key":"10_CR54","first-page":"958","volume-title":"Workshop on Privacy and Assurance (WPA 2008) at Conference on Availability, Reliability and Security (ARES 2008)","author":"S.G. Weber","year":"2008","unstructured":"Weber, S.G., Heinemann, A., M\u00fchlh\u00e4user, M.: Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. In: Workshop on Privacy and Assurance (WPA 2008) at Conference on Availability, Reliability and Security (ARES 2008), pp. 958\u2013964. IEEE Computer Society, Los Alamitos (2008)"},{"key":"10_CR55","unstructured":"Weber, S.G., Ries, S., Heinemann, A.: Inherent Tradeoffs in Ubiquitous Computing Services. In: INFORMATIK 2007. LNI, vol.\u00a0P109, pp. 364\u2013368. GI (September 2007)"},{"issue":"3","key":"10_CR56","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the 21st Century. Scientific American\u00a0265(3), 94\u2013104 (1991)","journal-title":"Scientific American"},{"key":"10_CR57","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/SFCS.1982.38","volume-title":"23th Annual Symposium on Foundations of Computer Science (FOCS 1982)","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocols for Secure Computations (Extended Abstract). In: 23th Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160\u2013164. IEEE Computer Society Press, Los Alamitos (1982)"}],"container-title":["Studies in Computational Intelligence","Intelligent Networking, Collaborative Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16793-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:31:05Z","timestamp":1619785865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16793-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642167928","9783642167935"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16793-5_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}