{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:23:06Z","timestamp":1774369386391,"version":"3.50.1"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iwcmc.2012.6314288","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T22:07:23Z","timestamp":1349820443000},"page":"689-696","source":"Crossref","is-referenced-by-count":3,"title":["A secure dynamic data aggregation system for citizen safety in emergency response scenarios"],"prefix":"10.1109","author":[{"given":"Miltos","family":"Hadjioannou","sequence":"first","affiliation":[]},{"given":"George C.","family":"Hadjichristofi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"683","article-title":"Strengthening sms-based authentication through usability","author":"alzomai","year":"2008","journal-title":"International Symposium on Parallel and Distributed Processing with Applications"},{"key":"2","first-page":"32","article-title":"Assistance when there's no assistance","volume":"16","author":"lundgren","year":"2005","journal-title":"Long-Term Orbit Technology for CellPhones PDAs GPS World"},{"key":"1","article-title":"Accuracy and time to first fix using consumer-grade gps receivers in software","author":"lehtinen","year":"2008","journal-title":"Telecommunications and Computer Networks"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1108\/10662240910927849"},{"key":"6","first-page":"1485","article-title":"An adaptive probabilistic trust model and its evaluation","volume":"3","author":"hang","year":"2008","journal-title":"Proc Int Joint Conf Autonomous Agents and Multiagent Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SSME.2009.43"},{"key":"4","first-page":"1","article-title":"Display security for online transactions: SMS-based authentication scheme","author":"alzomai","year":"2010","journal-title":"Internet Technology and Secured Transactions (ICITST)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982531"}],"event":{"name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC 2012)","location":"Limassol, Cyprus","start":{"date-parts":[[2012,8,27]]},"end":{"date-parts":[[2012,8,31]]}},"container-title":["2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6299140\/6314161\/06314288.pdf?arnumber=6314288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:30:04Z","timestamp":1490139004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6314288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2012.6314288","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}