{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:32:15Z","timestamp":1730305935034,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/wimob.2012.6379176","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:53:26Z","timestamp":1355867606000},"page":"853-860","source":"Crossref","is-referenced-by-count":0,"title":["An approach of secure and fashionable recognition for pervasive face-to-face social communications"],"prefix":"10.1109","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_33"},{"journal-title":"Oxford Dictionary","year":"0","key":"17"},{"key":"18","article-title":"Trust evaluation based security solution in ad hoc networks","volume":"10","author":"yan","year":"2003","journal-title":"The Seventh Nordic Workshop on Secure IT Systems NordSec 2003 Gjovik Norway"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"journal-title":"Courtly Bag","year":"0","key":"13"},{"journal-title":"EDAG Light Car","year":"0","key":"14"},{"journal-title":"Love Jackets","year":"0","key":"11"},{"journal-title":"Microsoft Printing Dress","year":"0","key":"12"},{"year":"0","key":"3"},{"key":"20","first-page":"20","article-title":"Distributed attribute-based encryption","author":"muller","year":"2008","journal-title":"Proceedings of the 11th Annual International Conference on Information Security and Cryptology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-211-74500-7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.933475"},{"key":"10","article-title":"'Smart Systems': Wearable Integration of Intelligent Technology","author":"dunne","year":"2002","journal-title":"International Center for Excellence in Wearable Computing and Smart Fashion Products"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2030066.2030079"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16355-5_33"},{"journal-title":"Demo Abstract Ad Hoc Social Networking Using MAND","year":"0","author":"stuedi","key":"5"},{"journal-title":"MicroBlog","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/286498.286800"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303005"}],"event":{"name":"2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2012,10,8]]},"location":"Barcelona, Spain","end":{"date-parts":[[2012,10,10]]}},"container-title":["2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362315\/6379056\/06379176.pdf?arnumber=6379176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:14:59Z","timestamp":1490130899000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6379176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wimob.2012.6379176","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}