{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:47:09Z","timestamp":1768258029698,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/wcnc.2013.6555339","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T14:58:33Z","timestamp":1374764313000},"page":"4718-4723","source":"Crossref","is-referenced-by-count":3,"title":["Secure user-friendly Wi-Fi access point joining"],"prefix":"10.1109","author":[{"given":"Jean-Marc","family":"Seigneur","sequence":"first","affiliation":[]},{"given":"Carlos Ballester","family":"Lafuente","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"Matos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"woodside","year":"2005","journal-title":"Read Real-World Hyperlinks With a Camera Phone"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"3","year":"0"},{"key":"2","article-title":"Trust management for selecting trustworthy access points","volume":"8","author":"titi","year":"2011","journal-title":"International Journal of Computer Science Issues"},{"key":"1","article-title":"Don't fall victim to the 'free wi-fi' scam","author":"preston","year":"2007","journal-title":"ComputerWorld Networking & Internet"},{"key":"10","article-title":"Mitigating evil twin attacks in 802.11","author":"bauer","year":"2008","journal-title":"Performance Computing and Communications Conference IEEE"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"5","year":"0"},{"key":"4","year":"0"},{"key":"9","author":"levien","year":"0","journal-title":"A Brief Comparison of Email Encryption Protocols"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023425"}],"event":{"name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","location":"Shanghai, Shanghai, China","start":{"date-parts":[[2013,4,7]]},"end":{"date-parts":[[2013,4,10]]}},"container-title":["2013 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6548699\/6554525\/06555339.pdf?arnumber=6555339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:44:20Z","timestamp":1490201060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6555339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2013.6555339","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}