{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:00:59Z","timestamp":1742385659957,"version":"3.38.0"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2003,4,1]],"date-time":"2003-04-01T00:00:00Z","timestamp":1049155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Pervasive Comput."],"published-print":{"date-parts":[[2003,4]]},"DOI":"10.1109\/mprv.2003.1203755","type":"journal-article","created":{"date-parts":[[2003,6,13]],"date-time":"2003-06-13T17:38:59Z","timestamp":1055525939000},"page":"62-71","source":"Crossref","is-referenced-by-count":6,"title":["Relationship management: secure collaboration in a ubiquitous environment"],"prefix":"10.1109","volume":"2","author":[{"given":"E.C.","family":"Epp","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref1s","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2002.1000461"},{"key":"ref2s","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587114"},{"key":"ref3s","doi-asserted-by":"publisher","DOI":"10.1109\/49.564150"},{"key":"ref4s","doi-asserted-by":"publisher","DOI":"10.1109\/35.925687"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"ref3","article-title":"Microsoft Warns of Hijacked Certificates","author":"Lemos","year":"2001","journal-title":"CNET News.com"},{"volume-title":"Design Patterns","year":"1995","author":"Gamma","key":"ref4"},{"key":"ref5","first-page":"172","volume-title":"Proc. 7th Int\u2019l Workshop Security Protocols","author":"Stajano","year":"1999"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_24"},{"key":"ref7","first-page":"139","article-title":"Public-Key Support for Collaborative Groups","volume-title":"Proc. 1st Ann. PKI Research Workshop, NIST","author":"Dohrmann","year":"2002"},{"key":"ref8","article-title":"Poblano: A Distributed Trust Model for Peer-to-Peer Networks","author":"Chen","year":"2001","journal-title":"Sun Microsystems"},{"key":"ref9","article-title":"Talking To Strangers: Authentication in Ad-Hoc Wireless Networks","volume-title":"Proc. Network and Distributed System Security Symp.","author":"Balfanz","year":"2002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"}],"container-title":["IEEE Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7756\/27106\/01203755.pdf?arnumber=1203755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:20:14Z","timestamp":1742098814000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1203755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,4]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,4]]}},"URL":"https:\/\/doi.org\/10.1109\/mprv.2003.1203755","relation":{},"ISSN":["1536-1268"],"issn-type":[{"type":"print","value":"1536-1268"}],"subject":[],"published":{"date-parts":[[2003,4]]}}}