{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:25Z","timestamp":1750307065317,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342405","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"271-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Vitamin C for your smartphone"],"prefix":"10.1145","author":[{"given":"Matthias","family":"W\u00e4hlisch","sequence":"first","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Sebastian","family":"Trapp","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Jochen","family":"Schiller","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Benjamin","family":"Jochheim","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Theodor","family":"Nolte","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Osman","family":"Ugus","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Martin","family":"Kutscher","sequence":"additional","affiliation":[{"name":"escrypt GmbH, Bochum, Germany"}]},{"given":"Matthias","family":"K\u00fcster","sequence":"additional","affiliation":[{"name":"escrypt GmbH, Bochum, Germany"}]},{"given":"Christian","family":"Keil","sequence":"additional","affiliation":[{"name":"DFN-CERT Services GmbH, Hamburg, Germany"}]},{"given":"Jochen","family":"Sch\u00f6nfelder","sequence":"additional","affiliation":[{"name":"DFN-CERT Services GmbH, Hamburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the 34th IEEE LCN. 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp)","author":"Bohli J. M.","year":"2009","unstructured":"Bohli , J. M. , Westhoff , D. , Hessler , A. , and Ugus , O . Security Enhanced Multi-Hop over the Air Re-programming with Fountain Codes . In Proc. of the 34th IEEE LCN. 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp) ( Piscataway, NJ, USA , October 2009 ), IEEE Press. Bohli, J. M., Westhoff, D., Hessler, A., and Ugus, O. Security Enhanced Multi-Hop over the Air Re-programming with Fountain Codes. In Proc. of the 34th IEEE LCN. 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp) (Piscataway, NJ, USA, October 2009), IEEE Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073290.2073303"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046627"}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Helsinki Finland","acronym":"SIGCOMM '12"},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:22Z","timestamp":1750238482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342405"}},"subtitle":["the SKIMS approach for cooperativeand lightweight security at mobiles"],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":3,"alternative-id":["10.1145\/2342356.2342405","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342405","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}