{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:26:58Z","timestamp":1729654018717,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/mue.2008.108","type":"proceedings-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T08:30:12Z","timestamp":1299573012000},"page":"186-190","source":"Crossref","is-referenced-by-count":1,"title":["Validating Secure Connections between Wireless Devices in Pervasive Computing Using Data Matrix"],"prefix":"10.1109","author":[{"given":"Seunghyun","family":"Im","sequence":"first","affiliation":[]}],"member":"263","reference":[{"volume":"1100","article-title":"mobile code consortium mc2","year":"0","key":"15"},{"journal-title":"Ezcode","year":"0","key":"13"},{"journal-title":"Semacode","year":"0","key":"14"},{"key":"11","first-page":"172","author":"stajano","year":"0","journal-title":"The resurrecting duckling Security issues for ad-hoc wireless networks"},{"article-title":"method for verifying a secure association between devices","year":"0","author":"zhang","key":"12"},{"key":"3","first-page":"196","article-title":"security and trust in mobile interactions: a study of users' perceptions and reasoning","author":"kindberg","year":"2004","journal-title":"Ubicomp"},{"key":"2","article-title":"talking to strangers: authentication in ad-hoc wireless networks","author":"balfanz","year":"2002","journal-title":"Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02)"},{"journal-title":"International Organization for Standardization Information Technology - International Symbology Specification - Data Matrix","year":"2000","key":"1"},{"key":"10","article-title":"a visual way to talk to strangers: authentication in ubiquitous computing","author":"shin","year":"2007","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-007-9039-2"},{"year":"0","key":"6"},{"key":"5","article-title":"evidently secure device association","volume":"hpl 2005 40","author":"kindberg","year":"2005","journal-title":"Technical Publications Department"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/10958513_4","article-title":"validating and securing spontaneous associations between wireless devices","author":"kindberg","year":"2003","journal-title":"Proceedings of the 6th Information Security Conference (ISC 09)"},{"key":"9","article-title":"using camera-equipped mobile phones for interacting with real-world objects","author":"rohs","year":"2004","journal-title":"2nd International Conference on Pervasive Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/354666.354667"}],"event":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","start":{"date-parts":[[2008,4,24]]},"location":"Busan, Korea","end":{"date-parts":[[2008,4,26]]}},"container-title":["2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/4505670\/4505671\/04505718.pdf?arnumber=4505718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T05:47:25Z","timestamp":1592372845000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/4505718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":15,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/mue.2008.108","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}