{"id":"https://openalex.org/W1967729673","doi":"https://doi.org/10.1016/s1571-0661(04)80687-x","title":"Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks","display_name":"Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks","publication_year":2003,"publication_date":"2003-08-01","ids":{"openalex":"https://openalex.org/W1967729673","doi":"https://doi.org/10.1016/s1571-0661(04)80687-x","mag":"1967729673"},"language":"en","primary_location":{"id":"doi:10.1016/s1571-0661(04)80687-x","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80687-x","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/s1571-0661(04)80687-x","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037581759","display_name":"Ren\u00e9 Mayrhofer","orcid":"https://orcid.org/0000-0003-1566-4646"},"institutions":[{"id":"https://openalex.org/I121883995","display_name":"Johannes Kepler University of Linz","ror":"https://ror.org/052r2xn60","country_code":"AT","type":"education","lineage":["https://openalex.org/I121883995"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Rene Mayrhofer","raw_affiliation_strings":["Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria","institution_ids":["https://openalex.org/I121883995"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063493247","display_name":"Florian Ortner","orcid":null},"institutions":[{"id":"https://openalex.org/I121883995","display_name":"Johannes Kepler University of Linz","ror":"https://ror.org/052r2xn60","country_code":"AT","type":"education","lineage":["https://openalex.org/I121883995"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Florian Ortner","raw_affiliation_strings":["Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria","institution_ids":["https://openalex.org/I121883995"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089575499","display_name":"Alois Ferscha","orcid":"https://orcid.org/0009-0000-7861-3497"},"institutions":[{"id":"https://openalex.org/I121883995","display_name":"Johannes Kepler University of Linz","ror":"https://ror.org/052r2xn60","country_code":"AT","type":"education","lineage":["https://openalex.org/I121883995"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Alois Ferscha","raw_affiliation_strings":["Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria","institution_ids":["https://openalex.org/I121883995"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109569947","display_name":"Manfred Hechinger","orcid":null},"institutions":[{"id":"https://openalex.org/I121883995","display_name":"Johannes Kepler University of Linz","ror":"https://ror.org/052r2xn60","country_code":"AT","type":"education","lineage":["https://openalex.org/I121883995"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Manfred Hechinger","raw_affiliation_strings":["Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Praktische Informatik, Johannes Kepler Universit\u00e4t Linz, Altenberger Str. 69, A-4040 Linz, Austria","institution_ids":["https://openalex.org/I121883995"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037581759"],"corresponding_institution_ids":["https://openalex.org/I121883995"],"apc_list":null,"apc_paid":null,"fwci":1.2401,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.83929117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"85","issue":"3","first_page":"105","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8103224039077759},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.7076969146728516},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5475888252258301},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.493627667427063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47753870487213135},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4426459074020386},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3366040289402008},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32500964403152466},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18217617273330688},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.13054853677749634},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0932149887084961}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8103224039077759},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.7076969146728516},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5475888252258301},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.493627667427063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47753870487213135},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4426459074020386},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3366040289402008},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32500964403152466},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18217617273330688},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.13054853677749634},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0932149887084961},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/s1571-0661(04)80687-x","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80687-x","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.1.7868","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mayrhofer.eu.org/rene/publications/SecCo2003-Securing-Passive-Objects.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1016/s1571-0661(04)80687-x","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80687-x","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W89672345","https://openalex.org/W1495746971","https://openalex.org/W1515421369","https://openalex.org/W1542020576","https://openalex.org/W1745205774","https://openalex.org/W1754939103","https://openalex.org/W1817601911","https://openalex.org/W1990453727","https://openalex.org/W2033751220","https://openalex.org/W2094204865","https://openalex.org/W2106101127","https://openalex.org/W2113038805","https://openalex.org/W2116876232","https://openalex.org/W2149891956","https://openalex.org/W2168793506","https://openalex.org/W2187516810","https://openalex.org/W2248136877","https://openalex.org/W2286477783","https://openalex.org/W2530316791","https://openalex.org/W3022131440","https://openalex.org/W4246079400","https://openalex.org/W4246892041","https://openalex.org/W6630757132","https://openalex.org/W6691013744","https://openalex.org/W6828947153","https://openalex.org/W7033774951"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W1581687089","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W2282175249"],"abstract_inverted_index":{"Security":[0],"and":[1,48],"privacy":[2,47],"in":[3],"mobile":[4],"ad-hoc":[5],"peer-to-peer":[6,36],"environments":[7],"are":[8,96],"hard":[9],"to":[10,63,72],"attain,":[11],"especially":[12],"when":[13],"working":[14],"with":[15,53],"passive":[16,64],"objects":[17,33],"(without":[18],"own":[19],"processing":[20],"power,":[21],"e.g.":[22],"RFID":[23],"tags).":[24],"This":[25],"paper":[26],"introduces":[27],"a":[28,35,43],"method":[29],"for":[30,50],"integrating":[31],"such":[32],"into":[34],"environment":[37],"without":[38],"infrastructure":[39],"components":[40],"while":[41],"providing":[42],"high":[44],"level":[45],"of":[46,80,86],"security":[49],"peers":[51,71],"interacting":[52],"objects.":[54],"The":[55],"integration":[56],"is":[57],"done":[58],"by":[59,70],"associating":[60],"public":[61],"keys":[62,95],"objects,":[65,93],"which":[66],"can":[67],"be":[68],"used":[69],"validate":[73],"proxies":[74],"(peers":[75],"additionally":[76],"acting":[77],"on":[78,90],"behalf":[79],"objects).":[81],"To":[82],"overcome":[83],"the":[84],"problem":[85],"limited":[87],"storage":[88],"capacity":[89],"small":[91],"embedded":[92],"ECC":[94],"used.":[97]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
