{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:38:11Z","timestamp":1725626291755},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745118","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"160-167","source":"Crossref","is-referenced-by-count":5,"title":["Location Authentication Methods for Wireless Network Access Control"],"prefix":"10.1109","author":[{"given":"Lichun","family":"Bao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"journal-title":"Authentication From Passwords to Public Keys","year":"2002","author":"smith","key":"35"},{"key":"17","article-title":"packet leashes: a defense against wormhole attacks in wireless ad hoc networks","author":"hu","year":"2003","journal-title":"Proc of INFOCOM"},{"key":"36","first-page":"31","article-title":"diffie-helhnan key distribution extended to group communication","author":"sterner","year":"1996","journal-title":"Proc of the 3rd ACM conference on Computer and communications security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"key":"33","article-title":"reducing mac layer handoff latency in ieee 802.11 wireless lans","author":"schulzrinne","year":"2004","journal-title":"ACM International Workshop on Mobility Management and Wireless Access (MobiWac 2004)"},{"key":"15","article-title":"a formal privacy system and its application to location based services","author":"guntcr","year":"2004","journal-title":"Proceedings of the Workshop on Privacy Enhancing Technologies"},{"journal-title":"RSA SecureID","year":"2003","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990039"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.437"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"the sybil attack","author":"douceur","year":"2002","journal-title":"First International Workshop on Peer-to-Peer Systems (IPTPS)"},{"year":"0","key":"14"},{"journal-title":"Modem Operating Systems","year":"2001","author":"tanenbaum","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/98.863996"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/QSHINE.2005.28"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1510"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424811"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.15"},{"article-title":"proving the location of tamper resistant devices","year":"2000","author":"waters","key":"40"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.47"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"article-title":"pac: location aware access control for pervasive computing environments","year":"2002","author":"michalakis","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"journal-title":"Microstrip Antennas The Analysis and Design of Microstrip Antennas and Arrays","year":"1995","author":"pozar","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"journal-title":"The network simulator - ns-2","year":"0","key":"29"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1016709"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012370"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"year":"0","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"5","first-page":"32","article-title":"ins\/twine: a scalable peer-to-peer architecture for intentional resource discovery","author":"balazinska","year":"2002","journal-title":"Proc of the First International Conference on Pervasive Computing"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.06.007"},{"key":"4","article-title":"supporting location-based conditions in access control policies","author":"ardagna","year":"2006","journal-title":"Proc of the ACM Symposium on InformAtion Computer and Communications Security (ASIACCS)"},{"key":"9","article-title":"sector: secure tracking of node encounters in multi-hop wireless networks","author":"capkun","year":"2003","journal-title":"Proc of SASN 2003"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.986462"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, Texas","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745118.pdf?arnumber=4745118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:51:11Z","timestamp":1497786671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745118","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}