{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:04Z","timestamp":1750307464608,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T00:00:00Z","timestamp":1287532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,20]]},"DOI":"10.1145\/1868630.1868644","type":"proceedings-article","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T12:36:11Z","timestamp":1288096571000},"page":"78-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security features of a generic sensor data acquisition system"],"prefix":"10.1145","author":[{"given":"Christian","family":"Probst","sequence":"first","affiliation":[{"name":"Salzburg Research Forschungsg m.b.H., Salzburg, Austria"}]},{"given":"Armin","family":"Veichtlbauer","sequence":"additional","affiliation":[{"name":"Salzburg Research Forschungsg m.b.H., Salzburg, Austria"}]}],"member":"320","published-online":{"date-parts":[[2010,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Salzburg Research Forschungsgesellschaft mbH. Rofco - robust facility communication. http:\/\/salzburgresearch.at\/research\/projects_detail.php?proj=146 (1.6.2010).  Salzburg Research Forschungsgesellschaft mbH. Rofco - robust facility communication. http:\/\/salzburgresearch.at\/research\/projects_detail.php?proj=146 (1.6.2010)."},{"volume-title":"Open Geospatial Consortium Inc.","year":"2007","author":"Botts M.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"E.\n       \n      Becker W.\n       \n      Buhse D.\n       \n      G\u00fcnnewig and \n      \n      \n      N.\n       \n      Rump editors\n      \n  \n  . \n  Digital Rights Management: Technological Economic Legal and Political Aspects volume \n  2770\n   of \n  Lecture Notes in Computer Science\n  . \n  Springer Verlag Heidelberg 2003\n  .   E. Becker W. Buhse D. G\u00fcnnewig and N. Rump editors. Digital Rights Management: Technological Economic Legal and Political Aspects volume 2770 of Lecture Notes in Computer Science. Springer Verlag Heidelberg 2003.","DOI":"10.1007\/b12637"},{"volume-title":"GRIN Verlag","year":"2009","author":"Z\u00f6chling M.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"C. Rigney S. Willens A. Rubens and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865 (Draft Standard) June 2000.  C. Rigney S. Willens A. Rubens and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865 (Draft Standard) June 2000.","DOI":"10.17487\/rfc2865"},{"volume-title":"1st International Conference on Sensor Networks Applications, Experimentation and Logistics (SENSAPPEAL 2009","year":"2009","author":"Chatzigiannakis I.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Internet2 Intellectual Property Framework. Shibboleth. http:\/\/shibboleth.internet2.edu (1.6.2010)  Internet2 Intellectual Property Framework. Shibboleth. http:\/\/shibboleth.internet2.edu (1.6.2010)"},{"volume-title":"PKI and IP Mobility. Wiley & Sons","year":"2005","author":"Nakhjiri M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"B. Schneier. Angewandte Kryptographie. Pearson Studium M\u00fcnchen 2005  B. Schneier. Angewandte Kryptographie. Pearson Studium M\u00fcnchen 2005"},{"key":"e_1_3_2_1_10_1","unstructured":"J. Daemen and V. Rijmen. AES Proposal: Rijndael Mar. 1999  J. Daemen and V. Rijmen. AES Proposal: Rijndael Mar. 1999"}],"event":{"name":"MSWiM '10: The 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Bodrum Turkey","acronym":"MSWiM '10"},"container-title":["Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868630.1868644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:29Z","timestamp":1750248509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,20]]},"references-count":10,"alternative-id":["10.1145\/1868630.1868644","10.1145\/1868630"],"URL":"https:\/\/doi.org\/10.1145\/1868630.1868644","relation":{},"subject":[],"published":{"date-parts":[[2010,10,20]]},"assertion":[{"value":"2010-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}