{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:55:00Z","timestamp":1747810500708},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540366461"},{"type":"electronic","value":"9783540378631"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11801412_13","type":"book-chapter","created":{"date-parts":[[2006,8,2]],"date-time":"2006-08-02T15:29:50Z","timestamp":1154532590000},"page":"132-143","source":"Crossref","is-referenced-by-count":4,"title":["\u201cFair\u201d Authentication in Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Jun","family":"Li","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Christianson","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Loomes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"13_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R. Anderson","year":"1994","unstructured":"Anderson, R.: Why Cryptosystems Fail. Communications of the ACM\u00a037(11), 32\u201340 (1994)","journal-title":"Communications of the ACM"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-39871-4_3","volume-title":"Security Protocols","author":"J. Arkko","year":"2004","unstructured":"Arkko, J., Nikander, P.: Weak authentication: How to authenticate unknown principals without trusted parties. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol.\u00a02845, pp. 5\u201319. Springer, Heidelberg (2004)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication Review\u00a023, 1627\u20131637 (2000)","journal-title":"Computer Communication Review"},{"key":"13_CR4","unstructured":"Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in ad-hoc Wireless Networks. In: Symposium on Nework and Distributed Systems Security (NDSS 2002) (February 2002)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. IEEE Conference on Security and Privacy, Oakland, CA, pp. 164\u2013173 (May 1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Security Protocols","author":"B. Christianson","year":"1997","unstructured":"Christianson, B., Harbison, W.S.: Why Isn\u2019t Trust Transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 171\u2013176. Springer, Heidelberg (1997)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BFb0028163","volume-title":"Security Protocols","author":"B. Christianson","year":"1998","unstructured":"Christianson, B., Malcolm, J.A.: Binding Bit Patterns to Real World Entities. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 105\u2013113. Springer, Heidelberg (1998)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/11542322_25","volume-title":"Security Protocols","author":"B. Christianson","year":"2005","unstructured":"Christianson, B.: Secure sessions from weak secrets. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 206\u2013212. Springer, Heidelberg (2005)"},{"key":"13_CR10","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model. In: Proc. of the 1st International Workshop on Formal Aspects in Security and Trust, pp. 83\u201397 (2003)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39881-3_12","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2004","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 116\u2013129. Springer, Heidelberg (2004)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory. Internet rfc 2693 (October 1999)","DOI":"10.17487\/rfc2693"},{"issue":"1","key":"13_CR13","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual Authentication for Wireless Devices. Cryptobytes\u00a07(1), 29\u201337 (2004)","journal-title":"Cryptobytes"},{"key":"13_CR14","unstructured":"Gong, L.: Cryptographic Protocols for Distributed Systems. Ph.D thesis, University of Cambridge (1990)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-540-39881-3_24","volume-title":"Security in Pervasive Computing","author":"D. Hutter","year":"2004","unstructured":"Hutter, D., Stephan, W., Ullmann, M.: Security and privacy in pervasive computing state of the art and future directions. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 285\u2013289. Springer, Heidelberg (2004)"},{"key":"13_CR16","unstructured":"Karger, P.A.: Improving Security and Performance for Capability Systems. Ph.D thesis, University of Cambridge (1988)"},{"key":"13_CR17","unstructured":"Langheinrich, M.: When Trust Does Not Compute \u2013 The Role of Trust in Ubiquitous computing. In: Workshop on Privacy at Ubicomp 2003 (October 2003)"},{"key":"13_CR18","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Florida (1997)"},{"key":"13_CR19","unstructured":"Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos Authentication and Authorisation System. Project Athena Technical Plan, section e.2.1, M.I.T. (October 1988)"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-39871-4_4","volume-title":"Security Protocols","author":"C.J. Mitchell","year":"2004","unstructured":"Mitchell, C.J., Pagliusi, P.S.: Is entity authentication necessary? In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol.\u00a02845, pp. 20\u201333. Springer, Heidelberg (2004)"},{"key":"13_CR21","unstructured":"Mullender, S.J.: Principles of Distributed Operating System Design. Ph.D thesis, Vrije Universiteit te Amsterdam (1985)"},{"issue":"12","key":"13_CR22","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"13_CR23","unstructured":"Roe, M.: Cryptography and Evidence. Ph.D thesis, University of Cambridge (1997)"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-39881-3_13","volume-title":"Security in Pervasive Computing","author":"J.-M. Seigneur","year":"2004","unstructured":"Seigneur, J.-M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end trust starts with recognition. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 130\u2013142. Springer, Heidelberg (2004)"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-36532-X_2","volume-title":"Software Security \u2013 Theories and Systems","author":"F. Stajano","year":"2003","unstructured":"Stajano, F.: Security for whom? In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 16\u201327. Springer, Heidelberg (2003)"},{"key":"13_CR26","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"Frank Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Proceedings of the 7th International Workshop Security Protocols. LNCS, vol.\u00a01296, pp. 172\u2013194 (1999)"},{"issue":"4","key":"13_CR27","doi-asserted-by":"crossref","first-page":"supl22","DOI":"10.1109\/MC.2002.1012427","volume":"35","author":"F. Stajano","year":"2002","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: security issues for ubiquitous computing. IEEE Computer\u00a035(4) (April 2002)","journal-title":"Computer"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"49","author":"A.M. Turing","year":"1950","unstructured":"Turing, A.M.: Computing Machinery and Intelligence. MIND\u00a049, 433\u2013460 (1950)","journal-title":"MIND"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"issue":"2","key":"13_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. Communications of the ACM\u00a047(2), 56\u201360 (2004)","journal-title":"Communications of the ACM"},{"issue":"3","key":"13_CR31","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the Twenty-First Century. Scientific American\u00a0265(3), 94\u2013104 (1991)","journal-title":"Scientific American"}],"container-title":["Lecture Notes in Computer Science","Secure Mobile Ad-hoc Networks and Sensors"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11801412_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:11:26Z","timestamp":1605625886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11801412_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540366461","9783540378631"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11801412_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}