{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:26:35Z","timestamp":1725575195239},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258636"},{"type":"electronic","value":"9783540323099"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424925_15","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T11:14:27Z","timestamp":1295090067000},"page":"122-127","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Authentication Mechanism Using Robot Vacuum Cleaner"],"prefix":"10.1007","author":[{"given":"Hong Joo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hee Jun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sangkyun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Oreback, A.: A Component Framework for Autonomous Mobile Robots, Doctoral Thesis (2004)","key":"15_CR1"},{"doi-asserted-by":"crossref","unstructured":"Coiffet, et al.: An introduction to robot technology, Hermes (1982)","key":"15_CR2","DOI":"10.1007\/978-94-011-6100-8"},{"unstructured":"Butler, J.: Robotics and Microelectronics Mobile Robots as Gateways into Wireless Sensor Networks. Technology@Intel Magazine (2003)","key":"15_CR3"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-44700-8_16","volume-title":"Electronic Commerce and Web Technologies","author":"S. Katzenbeisser","year":"2001","unstructured":"Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol.\u00a02115, pp. 165\u2013175. Springer, Heidelberg (2001)"},{"unstructured":"Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference (2003)","key":"15_CR5"},{"unstructured":"Lee, H.J.: Ubiquitous Innovation, e-co book (2004)","key":"15_CR6"},{"doi-asserted-by":"crossref","unstructured":"Tanh, D.V.: Security Issues in Mobile eCommerce. Lecture Notes in Computer Science, 467\u2013476 (2000)","key":"15_CR7","DOI":"10.1007\/3-540-44463-7_41"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424925_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:55:06Z","timestamp":1605624906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424925_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258636","9783540323099"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11424925_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}