{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:40:10Z","timestamp":1729669210095,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/aina.2012.31","type":"proceedings-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T20:15:04Z","timestamp":1335384904000},"page":"423-430","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing Systems"],"prefix":"10.1109","author":[{"given":"Kazuma","family":"Kadowaki","sequence":"first","affiliation":[]},{"given":"Satoshi","family":"Fujita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Practical JXTA II","year":"2010","author":"verstrynge","key":"15"},{"key":"13","first-page":"65","article-title":"Introduction of user authentication and access control mechanism into JXTA network","volume":"126","author":"tran","year":"2003","journal-title":"IPS \/ SIG Notes CSEC"},{"key":"14","first-page":"451","article-title":"Dynamic and secure user management in networked consumer electronics","volume":"2","author":"tokunaga","year":"2008","journal-title":"Proc the 200S International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2008)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986873"},{"journal-title":"Java Benchmarking Framework","year":"0","key":"3"},{"journal-title":"Robust Java Benchmarking","year":"0","author":"boyer","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.5296\/npa.v1i1.161","article-title":"Dynamic tlireshold cryptosystem without group manager","author":"noack","year":"2009","journal-title":"Network Protocols and Algorithms"},{"key":"7","first-page":"131","article-title":"Admission control in peer groups","author":"kim","year":"2003","journal-title":"Proc of the Second IEEE International Symposium on Network Computing and Applications (NCA 'Os)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2009.79"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"4","first-page":"370","article-title":"Dynamic threshold cryptosy stems: A new scheme in group oriented cryptography","author":"ghodosi","year":"1996","journal-title":"Proc 1st Int Conf Theory and Applications of Cryptology PRAGOCRYPT 96"},{"key":"9","first-page":"165","article-title":"Secure and flexible global file sharing","author":"miltchev","year":"2003","journal-title":"Proceedings of the Freenix Track 2003 USENIX Annual Technical Conference"},{"key":"8","first-page":"251","article-title":"Providing robust and ubiquitous security support for mobile ad hoc networks","author":"kong","year":"2001","journal-title":"Proc IEEE International Conference on Network Protocols"}],"event":{"name":"2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA)","start":{"date-parts":[[2012,3,26]]},"location":"Fukuoka, Japan","end":{"date-parts":[[2012,3,29]]}},"container-title":["2012 IEEE 26th International Conference on Advanced Information Networking and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6184368\/6184848\/06184901.pdf?arnumber=6184901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:52:24Z","timestamp":1497981144000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6184901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/aina.2012.31","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}