{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:58:03Z","timestamp":1725573483525},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554498","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"682-690","source":"Crossref","is-referenced-by-count":0,"title":["A security framework for personal networks"],"prefix":"10.1109","author":[{"family":"SeongHan Shin","sequence":"first","affiliation":[]},{"family":"Kazukuni Kobara","sequence":"additional","affiliation":[]},{"family":"Hideki Imai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2005","key":"ref10","article-title":"Overall secure PN architecture"},{"year":"2005","key":"ref11","article-title":"Implementation and Evaluation of the Network-Level Security Architecture"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref13","first-page":"97","article-title":"The Secure Remote Password Protocol","author":"wu","year":"1998","journal-title":"Proc Internet Society Symp Network and Distributed System Security"},{"key":"ref14","article-title":"Extensible Authentication Protocol (EAP)","author":"aboba","year":"2004","journal-title":"IETF RFC 3748"},{"year":"0","key":"ref15","article-title":"Port Based Network Access Control"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601340"},{"article-title":"MAGNET Secure Service Management","year":"2005","author":"prasad","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref4","first-page":"328","article-title":"Personal Network Security Architecture","author":"politis","year":"2005","journal-title":"Proc of WPMC2005"},{"key":"ref3","article-title":"MAGNET Personal Network Security Model: Trust Establishment, Policy Management and AAA Infrastructure","author":"kyriazanos","year":"2005","journal-title":"WWRF15"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-3-540-40061-5_10","article-title":"Leakage-Resilient Authenticated Key Establishment Protocols","author":"shin","year":"2003","journal-title":"Proc of Asiacrypt 2003"},{"article-title":"MAGNET Secure Service Management","year":"2005","author":"prasad","key":"ref5"},{"year":"2004","key":"ref8","article-title":"State of the Art in Wireless Network Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e88-a.3.736"},{"journal-title":"IEEE Standard for Information Technology Part 15 1","article-title":"Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)","year":"2005","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.236"},{"year":"2004","key":"ref9","article-title":"Security and Privacy Requirements of PNs"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554498.pdf?arnumber=4554498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:38:31Z","timestamp":1497778711000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554498","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}