{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:18:09Z","timestamp":1730211489633,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/cts.2011.5928723","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:51:27Z","timestamp":1310572287000},"page":"446-456","source":"Crossref","is-referenced-by-count":3,"title":["Secured histories for presence systems"],"prefix":"10.1109","author":[{"given":"Eleanor","family":"Rieffel","sequence":"first","affiliation":[]},{"given":"Jacob","family":"Biehl","sequence":"additional","affiliation":[]},{"given":"Bill","family":"van Melle","sequence":"additional","affiliation":[]},{"given":"Adam J.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1180995.1181001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2003.12.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/958432.958440"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"ref6","article-title":"Someone's watching you","author":"simonite","year":"2010","journal-title":"MIT Technology Review"},{"key":"ref5","article-title":"MyUnity: Building awareness and fostering community in the workplace","author":"biehl","year":"2010","journal-title":"FXPAL&#x2013;TR&#x2013;09&#x2013;21 and arXiv 1006 5024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/142750.142982"},{"key":"ref7","first-page":"602","article-title":"New proofs for NMAC and HMAC: Security without collision-resistance","author":"bellare","year":"2006","journal-title":"International Cryptology Conference"},{"article-title":"Manuscript in preparation","year":"2011","author":"biehl","key":"ref2"},{"key":"ref1","article-title":"People can be so fake: A new dimension to privacy and technology scholarship","volume":"114","author":"calo","year":"2010","journal-title":"Penn State Law Review"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240645"}],"event":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2011,5,23]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2011,5,27]]}},"container-title":["2011 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5875054\/5928646\/05928723.pdf?arnumber=5928723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:22:06Z","timestamp":1490088126000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5928723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cts.2011.5928723","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}