{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T17:27:06Z","timestamp":1648920426287},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s11390-005-0676-y","type":"journal-article","created":{"date-parts":[[2005,11,2]],"date-time":"2005-11-02T23:01:35Z","timestamp":1130972495000},"page":"676-688","source":"Crossref","is-referenced-by-count":1,"title":["Secure Application-Aware Service Differentiation in Public Area Wireless Networks"],"prefix":"10.1007","volume":"20","author":[{"given":"Weisong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Sharun","family":"Santhosh","sequence":"additional","affiliation":[]},{"given":"Hanping","family":"Lufei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"676_CR1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2002.986457","volume":"9","author":"P Bahl","year":"February 2002","unstructured":"Bahl P, Russell W, Wang Y et al. PAWNs: Satisfying the need for ubiquitous secure connectivity and location services. IEEE Personal Communications Magazine, February 2002, 9(1): 40\u201348.","journal-title":"IEEE Personal Communications Magazine"},{"key":"676_CR2","unstructured":"Public-Key Infrastructure (X.509). http:\/\/www.ieft.org\/html.charters\/pkix-charter.html."},{"key":"676_CR3","unstructured":"IEEE Std 802.11 \u2013- Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1997."},{"issue":"5","key":"676_CR4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/65.238150","volume":"7","author":"L Zhang","year":"September 1993","unstructured":"Zhang L, Deering S, Estrin D. RSVP: A new resource ReSerVation protocol. IEEE Network, September 1993, 7(5): 8\u201318.","journal-title":"IEEE Network"},{"key":"676_CR5","doi-asserted-by":"crossref","unstructured":"Breslau L, Knightly E, Shenker S et al. Endpoint admission control: Architectural issues and performance. In Proc. SIGCOMM, Stockholm, Sweden, September 2000, pp.57\u201369.","DOI":"10.1145\/347059.347400"},{"issue":"9","key":"676_CR6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"Neumann B Clifford","year":"September 1994","unstructured":"B Clifford Neumann, T Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, September 1994, 32(9): 33\u201338.","journal-title":"IEEE Communications Magazine"},{"key":"676_CR7","doi-asserted-by":"crossref","unstructured":"Balachandran A, Voelker G, Bahl P, Rangan V. Characterizing user behavior and network performance in a public wireless LAN. In Proc. ACM SIGMETRICS 2002, Marina Del Rey, CA, June 2002.","DOI":"10.1145\/511334.511359"},{"key":"676_CR8","doi-asserted-by":"crossref","unstructured":"Barford P, Crovella M E. Generating representative web workloads for network and server performance evaluation. In Proc. Performance'98\/ACM SIGMETRICS '98, Madison, WI, July, 1998.","DOI":"10.1145\/277851.277897"},{"key":"676_CR9","doi-asserted-by":"crossref","unstructured":"Zhu Z, Mao Y, Shi W. Workload characterization of uncacheable web content. In Proc. the 4th Int. Conf. Web Engineering (ICWE'04), Munich, Germany, July 2004.","DOI":"10.1007\/978-3-540-27834-4_48"},{"key":"676_CR10","unstructured":"Krishnamurthy B, Rexford J. Web Protocols and Practice: HTTP\/1.1, Networking Protocols, Caching and Traffic Measurement. Addison-Wesley, Inc, 2001."},{"key":"676_CR11","unstructured":"OpenSSL Project. http:\/\/www.openssl.org."},{"key":"676_CR12","doi-asserted-by":"crossref","unstructured":"Rivest R L, Shamir A, Adleman L. On digital signatures and public key cryptosystems. Comm. Ass. Comp. Machine., February 1978, 21.","DOI":"10.21236\/ADA606588"},{"key":"676_CR13","unstructured":"Apache HTTP Server Project. http:\/\/httpd.apache.org."},{"key":"676_CR14","unstructured":"Wireless LAN Traces from ACM SIGCOMM'01, 2001. http:\/\/ramp.ucsd.edu\/pawn\/sigcomm-trace."},{"key":"676_CR15","unstructured":"Nist Network Emulation Tool (NISTnet). http:\/\/www.antd.nist.gov\/nistnet\/index.html."},{"key":"676_CR16","doi-asserted-by":"crossref","unstructured":"Kindberg T et al. People, places, things: Web presence for the real world. In Proc. WMCSA'2000, Monterey, CA, December 2000.","DOI":"10.1109\/MCSA.2000.895378"},{"key":"676_CR17","doi-asserted-by":"crossref","unstructured":"Zhang K, Kindberg T. An authroization infrastructure for nomadic computing. In Proc. SACMAT'2002, Monterey, CA, May, 2002.","DOI":"10.1145\/507711.507728"},{"key":"676_CR18","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Ioannidis I et al. The role of trust management in distributed systems security. In Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Vitek and Jensen (eds.), 1999.","DOI":"10.1007\/3-540-48749-2_8"},{"key":"676_CR19","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Strauss M. Decentralized trust management. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp.164\u2013173.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"676_CR20","doi-asserted-by":"crossref","unstructured":"Corner M, Noble B. Zero-interaction authentication. In Proc. the 8th ACM SIGMOBILE Int. Conf. Mobil Computing and Networking (MobiCom'02), Atlanta, GA, USA, Sept. 2002.","DOI":"10.1145\/570645.570647"},{"issue":"5","key":"676_CR21","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/35.592101","volume":"35","author":"C E Perkins","year":"May 1997","unstructured":"Perkins C E. Mobile IP. IEEE Communications Magazine, May 1997, 35(5): 84\u201399.","journal-title":"IEEE Communications Magazine"},{"key":"676_CR22","doi-asserted-by":"crossref","unstructured":"Nandagopal T, Kim T, Gao X, Bharghavan V. Achieving MAC layer fairness in wireless packet networks. In Proc. the 6th ACM SIGMOBILE Int. Conf. Mobile Computing and Networking (MobiCom'00), Boston, MA, USA, August 2000, pp. 87\u201398.","DOI":"10.1145\/345910.345925"},{"key":"676_CR23","doi-asserted-by":"crossref","unstructured":"Vaidya N H, Bahl P, Gupta S. Distributed fair scheduling in a wireless LAN. In Proc. the 6th ACM SIGMOBILE Int. Conf. Mobile Computing and Networking (MobiCom'00), Boston, MA, USA, August 2000, pp.167\u2013178.","DOI":"10.1145\/345910.345939"},{"key":"676_CR24","doi-asserted-by":"crossref","unstructured":"Qiu L, Bahl P, Adya A. The effect of first-hop wireless bandwidth allocation on end-to-end network performance. In Proc. NOSSDAV 2002, Miami Beach, FL, USA, May 2002, pp.85\u201393.","DOI":"10.1145\/507670.507683"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-005-0676-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-005-0676-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-005-0676-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T16:39:13Z","timestamp":1586536753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-005-0676-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["676"],"URL":"https:\/\/doi.org\/10.1007\/s11390-005-0676-y","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}