{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:42:08Z","timestamp":1730288528734,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/percom.2004.1276869","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"319-328","source":"Crossref","is-referenced-by-count":9,"title":["Personal servers as digital keys"],"prefix":"10.1109","author":[{"given":"A.","family":"Beaufour","sequence":"first","affiliation":[]},{"given":"P.","family":"Bonnet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"RFC2411 - IP security: Document roadmap","author":"thayer","year":"1998","journal-title":"Technical Report"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"17"},{"journal-title":"Remote Keyless Entry and Convenience Center Reference Design with LIN Bus Interface","year":"2002","key":"18"},{"journal-title":"Recommendation for Key Management Part 1 General Guideline","year":"2003","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"KEELOQ Authentication Products","year":"2002","key":"13"},{"volume":"fips186 2","journal-title":"Digital Sinature Standard (DSS) Technical Report","year":"2000","key":"14"},{"journal-title":"Personal Server Project","year":"0","key":"11"},{"key":"12","article-title":"Evaluation of bluetooth communication: Simulation and experiments","volume":"2 3","author":"leopold","year":"2002","journal-title":"Technical Report"},{"journal-title":"Secure Access Control Using Mobile Bluetooth Devices","year":"2003","author":"beaufour","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192721"},{"journal-title":"SSH the Secure Shell The Definitive Guide","year":"2001","author":"barrett","key":"2"},{"journal-title":"Technical Report","article-title":"Contactless technology for secure physical access: Technology and standards choices","year":"2002","key":"1"},{"key":"10","article-title":"First experiences with bluetooth in the smart-its distributed sensor network","author":"kasten","year":"2001","journal-title":"Workshop on Ubiquitous Computing and Communications PACT 2001"},{"key":"7","article-title":"RFC2246 - The TLS protocol version 1.0","author":"dierks","year":"1999","journal-title":"Technical Report"},{"key":"6","article-title":"PGP in constrained wireless devices","author":"brown","year":"2000","journal-title":"Security Symposium"},{"journal-title":"Specification of the Bluetooth System - Core","year":"2001","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570749"},{"journal-title":"PGP Pretty Good Privacy","year":"1994","author":"garfinkel","key":"9"},{"journal-title":"Technical Report","article-title":"P800\/P802 white paper","year":"2003","key":"8"}],"event":{"name":"Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the","start":{"date-parts":[[2004,3,17]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2004,3,17]]}},"container-title":["Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8996\/28556\/01276869.pdf?arnumber=1276869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T02:27:14Z","timestamp":1489458434000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/percom.2004.1276869","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}