{"_id":"BaZ5zJ2Bn5p2kj6tZ","bibbaseid":"xiao-yan-lou-chen-hou-proximitybasedsecuritytechniquesformobileusersinwirelessnetworks-2013","downloads":0,"creationDate":"2016-10-21T15:13:51.345Z","title":"Proximity-Based Security Techniques for Mobile Users in Wireless Networks","author_short":["Xiao, L.","Yan, Q.","Lou, W.","Chen, G.","Hou, Y. T."],"year":2013,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/l/Lou:Wenjing","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Liang"],"propositions":[],"lastnames":["Xiao"],"suffixes":[]},{"firstnames":["Qiben"],"propositions":[],"lastnames":["Yan"],"suffixes":[]},{"firstnames":["Wenjing"],"propositions":[],"lastnames":["Lou"],"suffixes":[]},{"firstnames":["Guiquan"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Y.","Thomas"],"propositions":[],"lastnames":["Hou"],"suffixes":[]}],"title":"Proximity-Based Security Techniques for Mobile Users in Wireless Networks","journal":"IEEE Trans. Information Forensics and Security","volume":"8","number":"12","pages":"2089--2100","year":"2013","url":"http://dx.doi.org/10.1109/TIFS.2013.2286269","doi":"10.1109/TIFS.2013.2286269","timestamp":"Wed, 09 Mar 2016 00:00:00 +0100","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/tifs/XiaoYLCH13","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/tifs/XiaoYLCH13,\n author = {Liang Xiao and\n Qiben Yan and\n Wenjing Lou and\n Guiquan Chen and\n Y. Thomas Hou},\n title = {Proximity-Based Security Techniques for Mobile Users in Wireless Networks},\n journal = {{IEEE} Trans. Information Forensics and Security},\n volume = {8},\n number = {12},\n pages = {2089--2100},\n year = {2013},\n url = {http://dx.doi.org/10.1109/TIFS.2013.2286269},\n doi = {10.1109/TIFS.2013.2286269},\n timestamp = {Wed, 09 Mar 2016 00:00:00 +0100},\n biburl = {http://dblp.dagstuhl.de/rec/bib/journals/tifs/XiaoYLCH13},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Xiao, L.","Yan, Q.","Lou, W.","Chen, G.","Hou, Y. T."],"key":"DBLP:journals/tifs/XiaoYLCH13","id":"DBLP:journals/tifs/XiaoYLCH13","bibbaseid":"xiao-yan-lou-chen-hou-proximitybasedsecuritytechniquesformobileusersinwirelessnetworks-2013","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/TIFS.2013.2286269"},"downloads":0,"html":""},"search_terms":["proximity","based","security","techniques","mobile","users","wireless","networks","xiao","yan","lou","chen","hou"],"keywords":[],"authorIDs":[],"dataSources":["A7xqyS84Q4jXrtW8C"]}