JXTA Security in Mobile Constrained Devices | IEEE Conference Publication | IEEE Xplore