{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:05:43Z","timestamp":1729641943292,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2003.1245376","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"433-438","source":"Crossref","is-referenced-by-count":0,"title":["Facilitating secure ad hoc service discovery in public environments"],"prefix":"10.1109","author":[{"family":"Feng Zhu","sequence":"first","affiliation":[]},{"given":"M.","family":"Mutka","sequence":"additional","affiliation":[]},{"family":"Lionel Ni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"journal-title":"Understanding Public-Key Infrastructure - Concepts Standards and Deployment Considerations","year":"1999","author":"lloyd","key":"15"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"16"},{"key":"13","volume":"msu cse02 24","author":"zhu","year":"2002","journal-title":"Classification of Service Discovery in Pervasive Computing Environments"},{"journal-title":"Fundamentals of Computer Security Technology New Jersey","year":"1994","author":"amoroso","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2608"},{"journal-title":"Specification of the Bluetooth System - Core","year":"2001","key":"12"},{"key":"3","article-title":"Talking to Strangers: Authentication in Ad-Hoc Wireless Networks","author":"balfanz","year":"2002","journal-title":"11th Annual Network and Distributed System Security Symposium"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012427"},{"key":"1","article-title":"The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks","author":"stajano","year":"1999","journal-title":"7th International Workshop on Security Protocols"},{"journal-title":"Salutation Architecture Specification","year":"1999","key":"10"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45809-3_19","article-title":"A Privacy Awareness System for Ubiquitous Computing Environments","author":"langheinrich","year":"2002","journal-title":"UbiComp 2002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/508832.508845"},{"key":"5","article-title":"Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services","author":"zhu","year":"2003","journal-title":"1st IEEE Annual Conference on Pervasive Computing and Communications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/302350.302353"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/98.944002"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/35.968819"}],"event":{"name":"27th Annual International Computer Software and Applications Conference","acronym":"CMPSAC-03","location":"Dallas, TX, USA"},"container-title":["Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8813\/27898\/01245376.pdf?arnumber=1245376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:05:45Z","timestamp":1497571545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1245376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2003.1245376","relation":{},"subject":[]}}