{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:01:08Z","timestamp":1725764468371},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/percomw.2010.5470676","type":"proceedings-article","created":{"date-parts":[[2010,5,28]],"date-time":"2010-05-28T14:25:41Z","timestamp":1275056741000},"page":"147-152","source":"Crossref","is-referenced-by-count":9,"title":["Bootstrapping security associations in opportunistic networks"],"prefix":"10.1109","author":[{"given":"Abdullatif","family":"Shikfa","sequence":"first","affiliation":[]},{"given":"Melek","family":"Onen","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.73"},{"key":"ref11","article-title":"Privacy-preserving content-based publish\/subscribe networks","author":"shikfa","year":"2009","journal-title":"IFIP SEC 2009 24th International Information Security Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514302"},{"journal-title":"Cryptography Theory and Practice","year":"1995","author":"stinson","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/863973.863975"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356979"},{"journal-title":"Haggle project","year":"2006","key":"ref6"},{"key":"ref5","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"ref1","article-title":"Towards securing disruption-tolerant networking","author":"asokan","year":"2007","journal-title":"Technical Report NRC-TR-2007-007"},{"key":"ref9","article-title":"Bootstrapping security associations in content-based opportunistic networks","author":"shikfa","year":"2009","journal-title":"Technical Report RR-09-233"}],"event":{"name":"2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","start":{"date-parts":[[2010,3,29]]},"location":"Mannheim","end":{"date-parts":[[2010,4,2]]}},"container-title":["2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5462925\/5470493\/05470676.pdf?arnumber=5470676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:50:28Z","timestamp":1489888228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5470676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/percomw.2010.5470676","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}