{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T15:10:49Z","timestamp":1674486649686},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1007\/bf01200848","type":"journal-article","created":{"date-parts":[[2005,2,18]],"date-time":"2005-02-18T15:34:23Z","timestamp":1108740863000},"page":"297-309","source":"Crossref","is-referenced-by-count":10,"title":["The design and implementation of a private message service for mobile computers"],"prefix":"10.1007","volume":"1","author":[{"given":"David A.","family":"Cooper","sequence":"first","affiliation":[]},{"given":"Kenneth P.","family":"Birman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","unstructured":"A. Acharya and B. Badrinath, Delivering multicast messages in networks with mobile hosts,Proc. 13th Int. Conf. Dist. Comp. Syst. (1993).","DOI":"10.1109\/ICDCS.1993.287697"},{"issue":"1","key":"CR2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/98.295357","volume":"1","author":"A. Aziz","year":"1994","unstructured":"A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Commun. 1 (1) (1994) 25?31.","journal-title":"IEEE Personal Commun."},{"issue":"6","key":"CR3","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/49.232291","volume":"11","author":"M.J. Beller","year":"1993","unstructured":"M.J. Beller, L.-F. Chang and Y. Yacobi, Privacy and authentication on a portable communications system, IEEE J. Select. Areas Commun. 11 (6) (1993) 821?829.","journal-title":"IEEE J. Select. Areas Commun."},{"key":"CR4","unstructured":"G. Brassard, C. Crepeau and J.-M. Robert, All-or-nothing disclosure of secrets,CRYPTO '86 (1986) pp. 234?238."},{"issue":"3","key":"CR5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/182110.182112","volume":"28","author":"U. Carlsen","year":"1994","unstructured":"U. Carlsen, Optimal privacy and authentication on a portable communications system, Operating Syst. Rev. 28 (3) (1994) 16?23.","journal-title":"Operating Syst. Rev."},{"issue":"2","key":"CR6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM 24 (2) (1981) 84?88.","journal-title":"Commun. ACM"},{"issue":"1","key":"CR7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, J. Crypto. 1 (1) (1988) 65?75.","journal-title":"J. Crypto."},{"issue":"6","key":"CR8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/65.103804","volume":"5","author":"D. Duchamp","year":"1991","unstructured":"D. Duchamp, S.K. Feiner and G.Q. Maguire, Jr., Software technology for wireless mobile computing, IEEE Network Mag. 5 (6) (1991) 12?18.","journal-title":"IEEE Network Mag."},{"key":"CR9","unstructured":"National Bureau of Standards,Data Encryption Standard, FIPS-PUB-46 (1977)."},{"key":"CR10","unstructured":"C. Park, K. Itoh and K. Kurosawa, Efficient anonymous channel and all\/nothing election scheme,EUROCRYPT '93 (1993) pp. 248?259."},{"key":"CR11","unstructured":"A. Pfitzmann, B. Pfitzmann and M. Waidner, ISDN-MIXes: Untraceable communications with very small bandwidth overhead,IFIP\/Sec '91 (1991) 245?258."},{"key":"CR12","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6","author":"A. Pfitzmann","year":"1987","unstructured":"A. Pfitzmann and M. Waidner, Networks without user observability, Comp. & Sec. 6 (1987) 158?166.","journal-title":"Comp. & Sec."},{"key":"CR13","unstructured":"B. Pfitzmann, Breaking an efficient anonymous channel,EUROCRYPT '94 (1994) pp. 339?348."},{"key":"CR14","unstructured":"B. Pfitzmann and A. Pfitzmann, How to break the direct RSA-implementation of mixes,EUROCRYPT '89 (1989) pp. 373?381."},{"key":"CR15","doi-asserted-by":"crossref","unstructured":"C. Rackoff and D.R. Simon, Cryptographic defense against traffic analysis,Proc. 25th ACM Sym. Theory of Comp. (1993) pp. 672?681.","DOI":"10.1145\/167088.167260"},{"key":"CR16","doi-asserted-by":"crossref","unstructured":"M.K. Reiter, Secure agreement protocols: Reliable and atomic group multicast in Rampart,Proc. 2nd ACM Conf. Comp. and Commun. Security (1994).","DOI":"10.1145\/191177.191194"},{"key":"CR17","unstructured":"M.K. Reiter, A secure group membership protocol,Proc. 1994 IEEE Sym. Research in Security and Privacy (1994) pp. 176?189."},{"issue":"4","key":"CR18","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1145\/195792.195823","volume":"12","author":"M.K. Reiter","year":"1994","unstructured":"M.K. Reiter, K.P. Birman and R. van Renesse, A security architecture for fault-tolerant systems. ACM Trans. Comp. Syst. 12 (4) (1994) 340?371.","journal-title":"ACM Trans. Comp. Syst."},{"issue":"2","key":"CR19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21 (2) (1978) 120?126.","journal-title":"Commun. ACM"},{"key":"CR20","unstructured":"M. Shand and J. Vuillemin, Fast implementations of RSA cryptography,1993 IEEE 11th Sym. on Comp. Arch. (1993) pp. 252?259."},{"key":"CR21","unstructured":"G.J. Simmons,Contemporary Cryptology: The Science of Information Integrity (IEEE Press, 1992)."},{"key":"CR22","doi-asserted-by":"crossref","unstructured":"B. Simons, J.L. Welch and N. Lynch, An overview of clock synchronization, in:Fault-Tolerant Distributed Computing (1990) pp. 84?96.","DOI":"10.1007\/BFb0042327"},{"key":"CR23","unstructured":"R. van Renesse, T.M. Hickey and K.P. Birman, Design and performance of Horus: A lightweight group communications system, Technical Report TR 94-1442, Cornell University (1994)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01200848.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01200848\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01200848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T21:12:35Z","timestamp":1586121155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01200848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["BF01200848"],"URL":"https:\/\/doi.org\/10.1007\/bf01200848","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}