{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:59:18Z","timestamp":1743109158561},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/words.2003.1267495","type":"proceedings-article","created":{"date-parts":[[2004,6,21]],"date-time":"2004-06-21T21:52:40Z","timestamp":1087854760000},"page":"94-94","source":"Crossref","is-referenced-by-count":2,"title":["Providing Digital Time Stamping Services to Mobile Devices"],"prefix":"10.1109","author":[{"given":"D.","family":"Cotroneo","sequence":"first","affiliation":[]},{"given":"C.","family":"di Flora","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"L.","family":"Romano","sequence":"additional","affiliation":[]},{"given":"S.","family":"Russo","sequence":"additional","affiliation":[]},{"given":"G.P.","family":"Saggese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"41","article-title":"Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks","author":"kong","year":"2001","journal-title":"Proceedings of the ninth International Conference on Network Protocols (ICNP) 2001"},{"journal-title":"A Performance Analysis of Web Services on Wireless PDAs","year":"0","author":"bansal","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055749"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266430"},{"journal-title":"The MD5 Message Digest Algorithm RFC 1321","year":"1992","author":"rivest","key":"ref8"},{"journal-title":"Secure Hash Standard","article-title":"National Institute of Standards and Technology","year":"1995","key":"ref7"},{"journal-title":"ISO\/IEC Standard 18014 Information technology - Security techniques -Time stamping services","article-title":"International Organization for Standardization and International Electrotechnical Commission","year":"2002","key":"ref2"},{"journal-title":"Internet X 509 Public Key Infrastructure Time-Stamp Protocol (TSP) RFC Time Stamping","year":"2001","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159617"}],"event":{"name":"The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS' 03)","location":"Anacapri, Italy"},"container-title":["The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS' 03)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9690\/30574\/01410950.pdf?arnumber=1410950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T18:52:52Z","timestamp":1489517572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1410950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/words.2003.1267495","relation":{},"subject":[]}}