{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:14:36Z","timestamp":1729624476899,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134268","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure Content Centric Mobile Network"],"prefix":"10.1109","author":[{"family":"Mooi Choo Chuah","sequence":"first","affiliation":[]},{"family":"Xiong Xiong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Secure Content Centric Publish\/Subscribe System","author":"chuah","year":"2011","journal-title":"Lehigh CSE Technical Report"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBILWARE2008.2893"},{"key":"ref11","article-title":"Participatory sensing","author":"burke","year":"2006","journal-title":"World Sensor Web Workshop"},{"key":"ref12","article-title":"Participatory Sensing: A citizen-powered approach to illuminating the patterns that shape our world","author":"goldman","year":"2009","journal-title":"Woodrow Wilson Center for International Scholars"},{"key":"ref13","article-title":"Study raises new privacy concerns about Facebook","author":"young","year":"2008","journal-title":"Chronicles of Higher Education"},{"key":"ref14","first-page":"159","article-title":"Learning and recognizing the places we go","author":"hightower","year":"0","journal-title":"Proceedings of The Seventh International Conference on Ubiquitous Computing"},{"key":"ref15","article-title":"Best Current Practices for Wireless Internet Service Provider (WISP) Roaming","author":"anton","year":"2003","journal-title":"Wi-Fi Alliance"},{"key":"ref16","first-page":"73","article-title":"Running Cellular\/PWLAN services: practical considerations for Cellular\/PWLAN architecture supporting interoperator roaming","volume":"44","author":"leu","year":"0","journal-title":"IEEE Communications Magazine"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.900525"},{"key":"ref18","article-title":"A delay tolerant network architecture for challenged networks","author":"fall","year":"0","journal-title":"Proceedings of ACM SIGCOMM 2003"},{"key":"ref19","article-title":"Delay Tolerant Networking Architecture","author":"cerf","year":"2007","journal-title":"RFC4838"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"journal-title":"Dodgeball","year":"0","key":"ref4"},{"journal-title":"Proceedings of IEEE ICNP","article-title":"Declarative Policy-based Adaptive MANET Routing","year":"2009","key":"ref27"},{"journal-title":"MySpace","year":"0","key":"ref3"},{"journal-title":"Microsoft'sSLAM","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/506558.506612"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460445"},{"journal-title":"DTN2 Reference Implementation","year":"0","key":"ref7"},{"journal-title":"LinkedIn","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/1378600.1378620","article-title":"Microblog: Sharing and Querying Content Through Mobile Phones and Social Participation","author":"gaonkar","year":"2008","journal-title":"Proceedings of ACM MobiSys"},{"journal-title":"Facebook","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282422"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753335"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-27767-5_24","article-title":"Probabilistic Routing in Intermittently Connected Networks","author":"lingren","year":"2004","journal-title":"Proceedings of Workshop on Service Assurance with Partial and Intermittent Resources"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/1755743.1755758","article-title":"Secure Descriptive Message Dissemination in Disruption Tolerant Networks","author":"chuah","year":"2010","journal-title":"Proceedings of ACM MobiOpp"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.11","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"2007","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134268.pdf?arnumber=6134268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:48:38Z","timestamp":1686703718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134268","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}