{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:22:45Z","timestamp":1741324965190,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642218217"},{"type":"electronic","value":"9783642218224"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21822-4_15","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:27:40Z","timestamp":1309220860000},"page":"135-145","source":"Crossref","is-referenced-by-count":0,"title":["PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment"],"prefix":"10.1007","author":[{"given":"Chowdhury","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Adibuzzaman","sequence":"additional","affiliation":[]},{"given":"Ferdaus","family":"Kawsar","sequence":"additional","affiliation":[]},{"given":"Munirul","family":"Haque","sequence":"additional","affiliation":[]},{"given":"Sheikh Iqbal","family":"Ahamed","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Hopper, N., Blum, M.: A secure human computer authentication scheme., Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-CS-00-139 (2000)","DOI":"10.21236\/ADA382135"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"issue":"7","key":"15_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M. Weiser","year":"1993","unstructured":"Weiser, M.: Some computer problems in ubiquitous computing. Communications of the ACM\u00a036(7), 75\u201384 (1993)","journal-title":"Communications of the ACM"},{"key":"15_CR4","unstructured":"Eronen, P., Nikander, P.: Decentralized Jini security. In: Proceedings of the Network. Distributed. System Security Symposium, San Diego, CA (February 2001)"},{"key":"15_CR5","unstructured":"Hewlett Packard CoolTown (2008), http:\/\/cooltown.hp.com"},{"key":"15_CR6","unstructured":"UC Berkeley. The Ninja Project: Enabling internet scale services from arbitrarily small devices (2008), http:\/\/ninja.cs.berkeley.edu"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Balazinska, M., Balakrishnan, H., Karger, D.: INS\/Twine: A scalable peer-to-peer architecture for intentional resource discovery. In: Proceedings of the International Conference on Pervasive Computing, Zurich, Switzerland (2002)","DOI":"10.1007\/3-540-45866-2_16"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the 17 th ACM Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island, SC (1999)","DOI":"10.1145\/319151.319164"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/98.944002","volume":"8","author":"M. Nidd","year":"2001","unstructured":"Nidd, M.: Service discovery in DEAPspace. IEEE Pers. Communications\u00a08(4), 39\u201345 (2001)","journal-title":"IEEE Pers. Communications"},{"key":"15_CR10","unstructured":"Guttman, E., Perkins, C., Veizades, J.: Service location protocol. Version 2, http:\/\/www.ietf.org\/rfc\/rfc2608.txt"},{"key":"15_CR11","unstructured":"The Salutation Consortium, Inc. Salutation architecture specification (1999), http:\/\/ftp.salutation.org\/salute\/sa20e1a21.ps"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Czerwinski, S., Zhao, B.Y., Hodes, T., Joseph, A., Katz, R.: An architecture for a secure service discovery service. In: Procedings of the 5th Annual International Conference on Mobile Computing Networks (MobiCom 1999), Seattle, WA (1999)","DOI":"10.1145\/313451.313462"},{"key":"15_CR13","first-page":"1361","volume":"3","author":"P. Popovski","year":"2002","unstructured":"Popovski, P., Kozlova, T., Gavrilovska, L., Prasad, R.: Device discovery in short-range wireless ad hoc networks. IEEE Networks\u00a03, 1361\u20131365 (2002)","journal-title":"IEEE Networks"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Zaruba, G.V., Gupta, V.: Simplified Bluetooth device discovery\u2014 Analysis and simulation. In: Proceedings of the 37th Hawaii International Conference on Systems Sciences, pp. 307\u2013315 (January 2004)","DOI":"10.1109\/HICSS.2004.1265722"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Ferraguto, F., Mambrini, G., Panconesi, A., Petrioli, C.: A newapproach to device discovery and scatternet formation in Bluetooth networks. In: Proceedings of the 18th International Parallel Distributed Process. Symposium, pp. 221\u2013228 (April 2004)","DOI":"10.1109\/IPDPS.2004.1303259"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Zaruba, G.V., Chlamtac, I.: Accelerating Bluetooth inquiry for personal area networks. In: Proceedings of IEEE Global Telecommunication Conference, vol.\u00a02, pp. 702\u2013706 (December 2003)","DOI":"10.1109\/GLOCOM.2003.1258329"},{"issue":"5","key":"15_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/98.878532","volume":"7","author":"K. Sohrabi","year":"2000","unstructured":"Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.: Protocols for selforganization of a wireless sensor network. Proceedings of IEEE Pers. Communication\u00a07(5), 16\u201327 (2000)","journal-title":"Proceedings of IEEE Pers. Communication"},{"key":"15_CR18","unstructured":"Universal Plug and Play Forum. About universal plug and playtechnology (2008), http:\/\/www.upnp.org\/about\/default.asp#technology"},{"key":"15_CR19","unstructured":"Universal Plug and Play. Understanding universal plug and play: A white paper (June 2000), http:\/\/upnp.org\/resources\/whitepapers.asp"},{"key":"15_CR20","unstructured":"Sun Microsystems. Jini network technology (2008), http:\/\/www.sun.com\/jini"},{"key":"15_CR21","unstructured":"Sun Microsystems. The community resource for Jini technology (2008), http:\/\/www.jini.org"},{"issue":"8","key":"15_CR22","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2002.1024420","volume":"40","author":"P. Dobrev","year":"2002","unstructured":"Dobrev, P., Famolari, D., Kurzke, C., Miller, B.: Device and service discovery in home networks with OSGI. Proceedings of IEEE Communications Magazine\u00a040(8), 86\u201392 (2002)","journal-title":"Proceedings of IEEE Communications Magazine"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Fundamental challenges in mobile computing. In: Proceedings of 15th ACM Symposium on Principles of Distributed Computing, pp. 1\u20137 (May 1996)","DOI":"10.21236\/ADA306271"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Weis, S.A.: Security parallels between people and pervasive devices. In: Proceedings of 3rd IEEE International Conference on Pervasive Computing Communications Workshops, pp. 105\u2013109 (2005)","DOI":"10.1109\/PERCOMW.2005.72"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Sharmin, M., Ahmed, S., Ahamed, S.I.: An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments. In: Proc. of PerCom 2006, Pisa, Italy, pp. 258\u2013263 (2006)","DOI":"10.1109\/PERCOM.2006.6"},{"issue":"3","key":"15_CR27","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2008.919182","volume":"38","author":"M. Haque","year":"2008","unstructured":"Haque, M., Ahamed, S.I.: An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. IEEE Transactions on Systems, Man, and Cybernetics\u00a038(3), 334\u2013346 (2008)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Sharmin, M., Ahmed, S., Ahamed, S.I.: MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) in pervasive computing environments. In: Proc. of 3rd Int. Conf. Inf. Technol.: New Gen, pp. 306\u2013313 (April 2006)","DOI":"10.1109\/ITNG.2006.88"},{"key":"15_CR29","unstructured":"Ahmed, S., Sharmin, M., Ahamed, S.I.: Knowledge usability and its characteristics for pervasive computing. In: Proc. 2005 Int. Conf. pervasive Syst. Computing (PSC 2005), Las Vegas, NV, pp. 206\u2013209 (2005)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Sharmin, M., Ahmed, S., Ahamed, S.I.: SAFE-RD (Secure, adaptive, fault tolerant, and efficient resource discovery). in pervasive computing environments. In: Proc. IEEE Int. Conf. Inf. Technol (ITCC 2005), Las Vegas, NV, pp. 271\u2013276 (2005)","DOI":"10.1109\/ITCC.2005.249"},{"issue":"3","key":"15_CR31","first-page":"271","volume":"4","author":"S. Ahmed","year":"2007","unstructured":"Ahmed, S., Sharmin, M., Ahamed, S.I.: GETS (Generic, efficient, transparent and secured) self-healing service for pervasive computing application. Proceedings of International Journal of Network Security\u00a04(3), 271\u2013281 (2007)","journal-title":"Proceedings of International Journal of Network Security"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Hung, P.C.K.: Web services composition: A security perspective. In: Proceedings of the 21st Int. Conference on Data Engineering (ICDE 2005), Japan, April 8\u20139 (2005)","DOI":"10.1109\/WIRI.2005.36"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Martin, M.V., Hung, P.C.K.: Toward a security policy for VoIP applications. In: Proceedings of the 18th Annual Can. Conf. Electr. Comput. Eng (CCECE 2005), Saskatoon, SK, Canada (May 2005)","DOI":"10.1109\/CCECE.2005.1556878"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Aleksy, M., Schader, M., Tapper, C.: Interoperability and interchangeability of middleware components in a three-tier CORBA-environmentstate of the art. In: Proc. 3rd Int. Conf. Enterprise Distrib. Object Comput (EDOC 1999), pp. 204\u2013213 (1999)","DOI":"10.1109\/EDOC.1999.792064"}],"container-title":["Lecture Notes in Computer Science","Modern Approaches in Applied Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21822-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:27:14Z","timestamp":1741289234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21822-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642218217","9783642218224"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21822-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}