{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:29:15Z","timestamp":1725744555996},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405877"},{"type":"electronic","value":"9783642405884"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40588-4_29","type":"book-chapter","created":{"date-parts":[[2013,8,9]],"date-time":"2013-08-09T01:54:24Z","timestamp":1376013264000},"page":"414-429","source":"Crossref","is-referenced-by-count":1,"title":["Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness"],"prefix":"10.1007","author":[{"given":"Arcangelo","family":"Castiglione","sequence":"first","affiliation":[]},{"given":"Ciriaco","family":"D\u2019Ambrosio","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1049\/ip-vis:20041147","volume":"152","author":"M. Valera","year":"2005","unstructured":"Valera, M., Velastin, S.: Intelligent distributed surveillance systems: a review. IEE Proceedings Vision, Image and Signal Processing, IET\u00a0152(2), 192\u2013204 (2005)","journal-title":"IEE Proceedings Vision, Image and Signal Processing, IET"},{"issue":"3","key":"29_CR2","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W. Hu","year":"2004","unstructured":"Hu, W., Tan, T., Wang, L., Maybank, S.: A survey on visual surveillance of object motion and behaviors. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a034(3), 334\u2013352 (2004)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2005.1406476","volume":"22","author":"A. Hampapur","year":"2005","unstructured":"Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine\u00a022(2), 38\u201351 (2005)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/0004-3702(95)00041-0","volume":"78","author":"H. Buxton","year":"1995","unstructured":"Buxton, H., Gong, S.: Visual surveillance in a dynamic and uncertain world. Artificial Intelligence\u00a078(1), 431\u2013459 (1995)","journal-title":"Artificial Intelligence"},{"issue":"10","key":"29_CR5","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1109\/TPAMI.2003.1233909","volume":"25","author":"R. Cucchiara","year":"2003","unstructured":"Cucchiara, R., Grana, C., Piccardi, M., Prati, A.: Detecting moving objects, ghosts, and shadows in video streams. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a025(10), 1337\u20131342 (2003)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"29_CR6","unstructured":"Hartley, R., Zisserman, A.: Multiple view geometry in computer vision, vol.\u00a02. Cambridge University Press (2000)"},{"key":"29_CR7","unstructured":"Forsyth, D.A., Ponce, J.: Computer vision: a modern approach. Prentice Hall Professional Technical Reference (2002)"},{"key":"29_CR8","unstructured":"Parker, J.R.: Algorithms for image processing and computer vision. Wiley Publishing (2010)"},{"issue":"3","key":"29_CR9","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1006\/cviu.2000.0897","volume":"81","author":"T.B. Moeslund","year":"2001","unstructured":"Moeslund, T.B., Granum, E.: A survey of computer vision-based human motion capture. Computer Vision and Image Understanding\u00a081(3), 231\u2013268 (2001)","journal-title":"Computer Vision and Image Understanding"},{"issue":"2","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2008.5","volume":"9","author":"A. Kornecki","year":"2008","unstructured":"Kornecki, A.: Middleware for distributed video surveillance. IEEE Distributed Systems Online\u00a09(2), 1 (2008)","journal-title":"IEEE Distributed Systems Online"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/982452.982464","volume-title":"First ACM SIGMM International Workshop on Video Surveillance, IWVS 2003","author":"R. Cucchiara","year":"2003","unstructured":"Cucchiara, R., Grana, C., Prati, A., Vezzani, R.: Computer vision techniques for PDA accessibility of in-house video surveillance. In: First ACM SIGMM International Workshop on Video Surveillance, IWVS 2003, pp. 87\u201397. ACM, New York (2003)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Javed, O., Rasheed, Z., Alatas, O., Shah, M.: KNIGHT trade;: a real time surveillance system for multiple and non-overlapping cameras. In: Proceedings of 2003 International Conference on Multimedia and Expo, ICME 2003, vol.\u00a01, pp. 649\u2013652 (July 2003)","DOI":"10.1109\/ICME.2003.1221001"},{"issue":"5","key":"29_CR13","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1006\/rtim.2002.0298","volume":"8","author":"D. Comaniciu","year":"2002","unstructured":"Comaniciu, D., Berton, F., Ramesh, V.: Adaptive Resolution System for Distributed Surveillance. Real-Time Imaging\u00a08(5), 427\u2013437 (2002)","journal-title":"Real-Time Imaging"},{"issue":"5","key":"29_CR14","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1111\/j.1468-0394.2007.00438.x","volume":"24","author":"R. Cucchiara","year":"2007","unstructured":"Cucchiara, R., Prati, A., Vezzani, R.: A multi-camera vision system for fall detection and alarm generation. Expert Systems\u00a024(5), 334\u2013345 (2007)","journal-title":"Expert Systems"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Ostheimer, D., Lemay, S., Ghazal, M., Mayisela, D., Amer, A., Dagba, P.F.: A modular distributed video surveillance system over IP. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2006, pp. 518\u2013521. IEEE (2006)","DOI":"10.1109\/CCECE.2006.277603"},{"key":"29_CR16","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-15208-5_7","volume-title":"E-Commerce and Web Technologies","author":"A. Castiglione","year":"2010","unstructured":"Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F.: Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds.) E-Commerce and Web Technologies. LNBIP, vol.\u00a061, pp. 73\u201384. Springer, Heidelberg (2010)"},{"key":"29_CR17","unstructured":"Yuan, X., Sun, Z., Varol, Y., Bebis, G.: A distributed visual surveillance system. In: Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 199\u2013204. IEEE (2003)"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Dias, H., Rocha, J., Silva, P., Leao, C., Reis, L.P.: Distributed surveillance system. In: Portuguese Conference on Artificial Intelligence, EPIA 2005, pp. 257\u2013261. IEEE (2005)","DOI":"10.1109\/EPIA.2005.341225"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Desurmont, X., Bastide, A., Czyz, J., Parisot, C., Delaigle, J.F., Macq, B.: A general purpose system for distributed surveillance and communication. In: Intelligent Distributed Video Surveillance Systems, pp. 121\u2013156 (2006)","DOI":"10.1049\/PBPC005E_ch5"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Wu, Y.S., Chang, Y.S., Juang, T.Y., Yen, J.S.: An Architecture for Video Surveillance Service Based on P2P and Cloud Computing. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC\/ATC), pp. 661\u2013666. IEEE (2012)","DOI":"10.1109\/UIC-ATC.2012.43"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-642-32498-7_30","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"P. Albano","year":"2012","unstructured":"Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., You, I.: A Secure Distributed Video Surveillance System Based on Portable Devices. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 403\u2013415. Springer, Heidelberg (2012)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., Yim, K., You, I.: Secure and distributed video surveillance via portable devices. Journal of Ambient Intelligence and Humanized Computing, 1\u20139 (2013)","DOI":"10.1007\/s12652-013-0181-z"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 53\u201365. Springer, Heidelberg (2002)"},{"key":"29_CR24","unstructured":"Rhea, S.C., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a DHT. Computer Science Division, University of California (2003)"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Stutzbach, D., Rejaie, R.: Improving lookup performance over a widely-deployed DHT. In: Proc. Infocom, vol.\u00a06 (2006)","DOI":"10.1109\/INFOCOM.2006.329"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Vixie, P., Thomson, S., Rekhter, Y., Bound, J.: Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136 (Proposed Standard), Updated by RFCs 3007, 4035, 4033, 4034 (April 1997)","DOI":"10.17487\/rfc2136"},{"issue":"11","key":"29_CR27","first-page":"120","volume":"25","author":"G. Bradski","year":"2000","unstructured":"Bradski, G.: The OpenCV library. Doctor Dobbs Journal\u00a025(11), 120\u2013126 (2000)","journal-title":"Doctor Dobbs Journal"},{"key":"29_CR28","unstructured":"Bradski, G., Kaehler, A.: Learning OpenCV: Computer vision with the OpenCV library. O\u2019Reilly Media, Incorporated (2008)"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Wijnhoven, R., Jaspers, E., et al.: Flexible surveillance system architecture for prototyping video content analysis algorithms. In: International Society for Optics and Photonics Electronic Imaging 2006, p. 60730R (2006)","DOI":"10.1117\/12.649520"},{"key":"29_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-03964-5_6","volume-title":"E-Commerce and Web Technologies","author":"A. Castiglione","year":"2009","unstructured":"Castiglione, A., De Prisco, R., De Santis, A.: Do you trust your phone? In: Di Noia, T., Buccafurri, F. (eds.) EC-Web 2009. LNCS, vol.\u00a05692, pp. 50\u201361. Springer, Heidelberg (2009)"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: Proceedings of the 1st International Conference on Scalable Information Systems, p. 47. ACM (2006)","DOI":"10.1145\/1146847.1146894"},{"key":"29_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-36532-X_4","volume-title":"Software Security \u2013 Theories and Systems","author":"D.S. Wallach","year":"2003","unstructured":"Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 42\u201357. Springer, Heidelberg (2003)"},{"issue":"2","key":"29_CR33","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1883612.1883615","volume":"43","author":"G. Urdaneta","year":"2011","unstructured":"Urdaneta, G., Pierre, G., Steen, M.V.: A survey of DHT security techniques. ACM Computing Surveys (CSUR)\u00a043(2), 8 (2011)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Wang, P., Tyra, J., Chan-Tin, E., Malchow, T., Kune, D.F., Hopper, N., Kim, Y.: Attacking the KAD network. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, p. 23. ACM (2008)","DOI":"10.1145\/1460877.1460907"},{"key":"29_CR35","unstructured":"Irvine, D.: Kademlia DHT with NAT traversal, \n                      \n                        http:\/\/code.google.com\/p\/maidsafe-dht\/\n                      \n                      \n                     (accessed June 16, 2013)"},{"issue":"6","key":"29_CR36","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/j.cose.2012.06.004","volume":"31","author":"A. Castiglione","year":"2012","unstructured":"Castiglione, A., Cattaneo, G., Cembalo, M., De Santis, A., Faruolo, P., Petagna, F., Ferraro Petrillo, U.: Engineering a secure mobile messaging framework. Computers & Security\u00a031(6), 771\u2013781 (2012)","journal-title":"Computers & Security"},{"key":"29_CR37","doi-asserted-by":"crossref","unstructured":"De Santis, A., Castiglione, A., Cattaneo, G., Cembalo, M., Petagna, F., Ferraro Petrillo, U.: An Extensible Framework for Efficient Secure SMS. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 843\u2013850 (2010)","DOI":"10.1109\/CISIS.2010.81"},{"key":"29_CR38","doi-asserted-by":"crossref","unstructured":"Ramsdell, B.: S\/MIME version 3 message specification (1999)","DOI":"10.17487\/rfc2633"},{"key":"29_CR39","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"}],"container-title":["Lecture Notes in Computer Science","Security Engineering and Intelligence Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40588-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T14:04:25Z","timestamp":1558015465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40588-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405877","9783642405884"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40588-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}