{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:45:21Z","timestamp":1725493521619},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540422754"},{"type":"electronic","value":"9783540482062"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-48206-7_16","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T16:14:12Z","timestamp":1193328852000},"page":"175-182","source":"Crossref","is-referenced-by-count":4,"title":["Hardware Security Concept for Spontaneous Network Integration of Mobile Devices"],"prefix":"10.1007","author":[{"given":"Igor","family":"Sedov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Haase","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Clemens","family":"Cap","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dirk","family":"Timmermann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,6,28]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications-the insecurity of 802.11. University Berkley, 2001.","DOI":"10.1145\/381677.381695"},{"key":"16_CR2","unstructured":"F. Buchert, W. B\u00fctow, P. Eschoholz, A. Polonsky, F. Quintero, and D. Tavangarian. Ubiquitous Internet and Intranet Access Using WLAN. In Proceeding of the Workshop on Ubiquitous Computing, International Conference on Parallel Architecture and Compilation Techniques, Philadelphia, 2000."},{"key":"16_CR3","unstructured":"Bluetooth Consortium. Specification of the Bluetooth System Version 1.0B-Core. http:\/\/www.bluetooth.com , 2000."},{"key":"16_CR4","unstructured":"The Infrared Data Association IrDA. http:\/\/www.irda.org ."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. RSA Conference 2001, 2001.","DOI":"10.1007\/3-540-45353-9_14"},{"key":"16_CR6","unstructured":"Nico Maibaum and Clemens Cap. Javacards as Ubiquitous, Mobile and Multiserve Cards. 1st Pact 2000 Workshop on ubiquitous Computing, Philadelphia, USA, 15.-19. October 2000."},{"key":"16_CR7","unstructured":"Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trustworthy user devices. In G\u00fcnter M\u00fcller and Kai Rannenberg, editor, Multilateral Security in Communications, pages 137\u2013156. Addison-Wesley, 1999."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Jan Rabaey and et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking. IEEE Computer, pages 42\u201348, July 2000.","DOI":"10.1109\/2.869369"},{"key":"16_CR9","unstructured":"M. Schmalisch, H. Ploog, and D. Timmermann. SECOM: Sichere Online Verschl\u00fcsselung fuer ISDN Ger\u00e4te. 35. Sitzung des Arbeitskreises Technische und organisatorische Datenschutzfragen der Konferenz der Datenschutzbeauftragten des Bundes und der L\u00e4nder, Rostock, September 2000."},{"key":"16_CR10","unstructured":"Bruce Schneier. Angewandte Kryptographie. Addison-Wesley, 1998."},{"key":"16_CR11","unstructured":"Dave Suvak. IrDa and Bluetooth: A Complementary Comparison. http:\/\/www.palowireless.com\/infotooth\/download.asp , 2000."}],"container-title":["Lecture Notes in Computer Science","Innovative Internet Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48206-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:55:47Z","timestamp":1556916947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48206-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540422754","9783540482062"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-48206-7_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}