{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:14Z","timestamp":1767339914719,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838325","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A case study for a secure and robust geo-fencing and access control framework"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Rahimi","sequence":"first","affiliation":[]},{"given":"Tuerxun","family":"Maimaiti","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2025876.2025889"},{"key":"17","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.proeng.2012.04.170","article-title":"Wifi bluetooth based combined positioning algorithm","volume":"35","author":"galvan-tejada","year":"2012","journal-title":"Procedia Engineering"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2011.50"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200692"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2010.5483748"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016003126882"},{"journal-title":"Location-aware computing A neural network model for determining location in wireless LANs","year":"2002","author":"battiti","key":"14"},{"key":"11","article-title":"Indoor lbs based on svm and rssi method","author":"chang","year":"2011","journal-title":"Proceedings of BAI Conference"},{"key":"12","first-page":"18","author":"castro","year":"2001","journal-title":"A Probabilistic Room Location Service for Wireless Networked Environments"},{"key":"21","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/978-1-4419-5906-5_54","article-title":"Jamming resistance","author":"capkun","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"20","first-page":"64","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"journal-title":"Computer System and Method for Indoor Geo-fencing and Access Control","year":"2013","author":"gadher","key":"22"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"23"},{"journal-title":"JOSSO Official Project Website","year":"2012","key":"24"},{"journal-title":"CAS Official Project Website","year":"2012","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"journal-title":"Moving average","year":"2009","author":"hyndman","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"29","article-title":"Sslstrip","author":"marlinspike","year":"2009","journal-title":"Thoughtcrime Labs"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597198"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"10","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1007\/11893004_81","article-title":"Adequate rssi determination method by making use of svm for indoor localization","author":"miura","year":"2006","journal-title":"Proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II"},{"journal-title":"Byod Trend Pressures Corporate Networks","year":"2011","key":"1"},{"key":"30","first-page":"1","article-title":"Latency analysis of 3g network components","author":"laner","year":"2012","journal-title":"European Wireless 2012 EW 18th European Wireless Conference"},{"journal-title":"Wifi Based Rtls Solutions and Wireless Sensor Technologies by Aeroscout","year":"2012","key":"7"},{"journal-title":"Glopos Indoor Positioning Accuracy Tests Conducted by Vtt","year":"2012","key":"6"},{"journal-title":"Ekahau - Wi-Fi Tracking Systems RTLS and WLAN Site Survey","year":"2012","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1373859"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192736"},{"journal-title":"Enhancements to the Radar User Location and Tracking System","year":"2000","author":"bahl","key":"8"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838325.pdf?arnumber=6838325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T13:30:59Z","timestamp":1598103059000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838325","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}