{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:39Z","timestamp":1750307019175,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184591","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"333-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Location proofing using identity based encryption and the Google cloud on the mobile applications"],"prefix":"10.1145","author":[{"given":"Pramukh","family":"Karla","sequence":"first","affiliation":[{"name":"Texas A&amp;M University- Commerce, Commerce, TX"}]},{"given":"Vikhyath","family":"Marapadaga","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Varadraj","family":"Gurupur","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University- Commerce, Commerce, TX"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Enabling new mobile applications. ACM Trans","author":"Stefan S.","year":"2009","unstructured":"Stefan , S. , Alex , W. , 2009. Enabling new mobile applications. ACM Trans . 2009 , DOI= http:\/\/doi.acm.org\/10.1145\/1514411.1514414. Stefan, S., Alex, W., 2009. Enabling new mobile applications. ACM Trans. 2009, DOI= http:\/\/doi.acm.org\/10.1145\/1514411.1514414."},{"key":"e_1_3_2_1_2_1","unstructured":"Louise O. Adam D. and Tom D. 2004. An identity based encryption system. ACM Trans. 2004.  Louise O. Adam D. and Tom D. 2004. An identity based encryption system. ACM Trans. 2004 ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025876.2025892"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734586"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":6,"alternative-id":["10.1145\/2184512.2184591","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184591","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}