{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:25:55Z","timestamp":1725467155320},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icon.2002.1033349","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:21:35Z","timestamp":1056568895000},"page":"428-433","source":"Crossref","is-referenced-by-count":4,"title":["Secure authorization, access control and data integrity in Bluetooth"],"prefix":"10.1109","author":[{"given":"L.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"R.","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"W.","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"T.","family":"Wysocki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Bluetooth Security","author":"vainio","year":"2000","journal-title":"Proceedings of Helsinki University of Technology Telecommunication Software and Multimedia Laboratory Seminar on Internetworking Ad Hoc Networking"},{"key":"18","first-page":"97","article-title":"The Secure Remote Password Protocol","author":"wu","year":"1998","journal-title":"Proreedings of the 1998 Internet Society Network and Distributed System Security Symposium"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"journal-title":"Security of Bluetooth An Overview of Bluetooth Security","year":"0","author":"tra?skba?ck","key":"16"},{"journal-title":"Bluetooth Demystified","year":"2001","author":"muller","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"journal-title":"Bluetooth Revealed","year":"2002","author":"miller","key":"11"},{"journal-title":"Bluetooth technology","year":"0","key":"12"},{"key":"3","first-page":"148","article-title":"Bluetooth Security","year":"2001","journal-title":"Bluetooth Specification Version 1 1"},{"journal-title":"The Official Bluetooth Wireless Info Site","year":"0","key":"2"},{"journal-title":"The AuthA Protocol for Password-based Authenticated Key Exchange","year":"0","author":"bellare","key":"1"},{"journal-title":"Kandbook of Applied Cryptography","year":"1997","author":"menezes","key":"10"},{"key":"7","first-page":"179","article-title":"Security Weaknesses in Bluetooth","author":"jacobson","year":"2001","journal-title":"Rsa Conference 2001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/242896.242897"},{"journal-title":"Bluetooth Specification Version 1 1","article-title":"Serial Port Profile","year":"2001","key":"5"},{"journal-title":"Bluetooth Specification Version 1 1","article-title":"RFCOMM with TS 07.10","year":"2001","key":"4"},{"journal-title":"Secure Network Authentication with Password Identification","year":"1999","author":"mackenzie","key":"9"},{"journal-title":"Authentication and Key Agreement Via Memorable Password","year":"2000","author":"kwon","key":"8"}],"event":{"name":"10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority","acronym":"ICON-02","location":"Singapore"},"container-title":["Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8036\/22194\/01033349.pdf?arnumber=1033349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T16:11:16Z","timestamp":1489162276000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1033349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icon.2002.1033349","relation":{},"subject":[]}}