{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:48:22Z","timestamp":1742384902612},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_9","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"123-138","source":"Crossref","is-referenced-by-count":3,"title":["A Geo Time Authentication System"],"prefix":"10.1007","author":[{"given":"L.","family":"Mostarda","sequence":"first","affiliation":[]},{"given":"A.","family":"Tocchio","sequence":"additional","affiliation":[]},{"given":"P.","family":"Inverardi","sequence":"additional","affiliation":[]},{"given":"S.","family":"Costantini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Augello A, Santangelo A, Sorce S, Pilato G, Gentile A, Genco A, Gaglio S. Maga: A mobile archaeological guide at agrigento. University of Palermo, ICAFLCNR."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bailey D. and Juels A (2006) Shoehorning security into the EPC standard. In: De Prisco R, Yung M (eds) International Conference on Security in Communication Networks, volume 4116 of LNCS, pages 303\u2013320, Springer-Verlag.","DOI":"10.1007\/11832072_21"},{"key":"9_CR3","unstructured":"Caputo T. (2005) Rfid technology beyond wal-mart. WinesandVines."},{"key":"9_CR4","unstructured":"EPC global standard powered by GS1 (2005) Object Naming Service (ONS) 5 Version 1.0. Whitepaper, http:\/\/www.epcglobalinc.org\/ standards\/ Object_Naming_Service-ONS_Standard_Version_1.0.pdf EPCglobal Ratified Specification Version of October 4, 2005."},{"key":"9_CR5","unstructured":"European Commision 6th Framework Program \u2014 2nd Call Galileo Joint Undertaking. Cultural Heritage Space Identification System (CUSPIS). http:\/\/www.cuspis-project.info ."},{"key":"9_CR6","first-page":"291","volume-title":"RFID: Applications, Security and privacy","author":"S. Garfinkel","year":"2005","unstructured":"Garfinkel S and Rosemberg B (2005) Hacking the prox card. In: RFID: Applications, Security and privacy, pages 291\u2013300. MA: Addison-Wesley."},{"key":"9_CR7","volume-title":"Proc. 4th International Conference on Security Communication Network","author":"A. Juels","year":"2004","unstructured":"Juels A (2004) Minimalist cryptography for low-cost rfid tags. In: Proc. 4th International Conference on Security Communication Network, C. Blundo and C. Blundo, Eds. New York: Springer LNCS."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Juels A (2006) Rfid security and privacy: A research survey. IEEE Journal on Selected Areas in Communication.","DOI":"10.1109\/JSAC.2005.861395"},{"key":"9_CR9","unstructured":"Juels A, Molnar D, and Wagner D (2005) Security and privacy issues in epassports. In: Gollman D, Li G, Tsudik G, (eds) IEEE\/CreateNet SecureComm."},{"key":"9_CR10","unstructured":"official web page of Galileo. http:\/\/www.galileoju.com."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Pozzobon O, Wullems C, Kubic K. (2004) Secure tracking using trusted gnss receivers and galileo authentication services. Journal of Global Positioning Systems.","DOI":"10.5081\/jgps.3.1.200"},{"key":"9_CR12","unstructured":"Stallings W (2006) Cryptography and network security: Principles and Practice. Fourth edition, Prentice Hall (eds)."},{"key":"9_CR13","unstructured":"Texas Instruments and VeriSign, Inc. Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies. Whitepaper, http:\/\/www.ti.com\/ rfid\/ docs\/ customer\/ eped-form.shtml ."},{"key":"9_CR14","unstructured":"web page of Italia Oggi journal. http:\/\/www.italiaoggi.it\/giornali\/giornali.asp?codici Testate=45&argomento=Circuits ."},{"key":"9_CR15","unstructured":"web page of the Sea Smoke Cellars. http:\/\/www.packagingdigest.com\/articles\/200509\/ 64.php ."},{"key":"9_CR16","unstructured":"web page of the TagStream Company. http:\/\/www.tagstreaminc.com ."},{"key":"9_CR17","unstructured":"web page on EPCglobal organization. http:\/\/www.epcglobalinc.org\/home ."},{"key":"9_CR18","unstructured":"Jakobsson M and Wetzel S (2001). Security weakness in Bluetooth. volume 2020 of LNCS. Springer Verlang."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:49Z","timestamp":1619669569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_9","relation":{},"subject":[]}}