{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:47:18Z","timestamp":1726055238283},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335052"},{"type":"electronic","value":"9783030335069"}],"license":[{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33506-9_53","type":"book-chapter","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T22:15:43Z","timestamp":1571350543000},"page":"589-596","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Individually Separated Wireless Access Point to Protect User\u2019s Private Information"],"prefix":"10.1007","author":[{"given":"Myoungsu","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"key":"53_CR1","unstructured":"Qualcomm: The Wi-Fi Evolution an integral part of the wireless landscape. https:\/\/www.qualcomm.com\/media\/documents\/files\/the-wi-fi-evolution-an-integral-part-of-the-wireless-landscape.pdf"},{"key":"53_CR2","unstructured":"Telecom Advisory Services: The Economic Value of Wi-Fi: a Global View (2018 and 2023), October 2018. https:\/\/www.wifi.org\/download.php?file=\/sites\/default\/files\/private\/Economic%20Value%20of%20Wi-Fi%202018.pdf"},{"key":"53_CR3","unstructured":"Rojone: Wireless CPE, Access Points, Adapters Wireless Networking Tutorial. https:\/\/www.rojone.com\/assets\/files\/L-Com-03-Wireless-CPE-Access-Points-Adapters.pdf"},{"key":"53_CR4","unstructured":"ABI Research: Global Wi-Fi Hotspots will Grow to 7.1 Million in 2015 as a Method to Offload Traffic. https:\/\/www.abiresearch.com\/press\/global-wi-fi-hotspots-will-grow-to-71-million-in-2\/ . Accessed July 2019"},{"key":"53_CR5","unstructured":"Tomi\u0107, V., Stojanovi\u0107, D.: Trends and innovations in mobile banking (2018). https:\/\/www.researchgate.net\/publication\/330468035_Trends_and_innovations_in_mobile_banking"},{"key":"53_CR6","unstructured":"Ganapati, S.: Using Mobile Apps in Government, Washington DC: IBM Center for the Business of Government (2015). http:\/\/www.businessofgovernment.org\/sites\/default\/files\/Using%20Mobile%20Apps%20in%20Government.pdf"},{"key":"53_CR7","unstructured":"Maimon, D., Becker, M., Patil, S., Katz, J.: Self-protective behaviors over public WiFi networks. In: The Workshop: Learning from Authoritative Security Experiment Results, pp. 69\u201376 (2017). https:\/\/www.usenix.org\/system\/files\/conference\/laser2017\/laser2017_maimon.pdf"},{"key":"53_CR8","unstructured":"Public WiFi: The Hidden Dangers of Public WiFi (2014). https:\/\/www.privatewifi.com\/wp-content\/uploads\/2015\/01\/PWF_whitepaper_v6.pdf"},{"key":"53_CR9","unstructured":"Muppavarapu, R.: Open Wi-Fi hotspots-Threats and Mitigations (2014). https:\/\/dl.packetstormsecurity.net\/papers\/wireless\/openwifimitigations.pdf"},{"key":"53_CR10","unstructured":"Norton: The risks of public Wi-Fi. https:\/\/us.norton.com\/internetsecurity-privacy-risks-of-public-wi-fi.html . Accessed July 2019"},{"key":"53_CR11","unstructured":"Shahin, E.: Is WiFi worth it: the hidden dangers of public WiFi. Catholic Univ. J. Law Technol. 25(1), 7 (2017). https:\/\/scholarship.law.edu\/cgi\/viewcontent.cgi?article=1023&context=jlt"},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi?: an investigation of behaviour and factors driving decisions. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. ACM (2016). https:\/\/www.researchgate.net\/publication\/319694418_Why_do_people_use_unsecure_public_Wi-Fi_An_investigation_of_behaviour_and_factors_driving_decisions","DOI":"10.1145\/3046055.3046058"},{"issue":"1","key":"53_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1515\/acss-2017-0005","volume":"21","author":"R\u016bdolfs Kalni\u0146\u0161","year":"2017","unstructured":"Kalni\u0146\u0161, R., Puri\u0146\u0161, J., Alksnis, G.: Security evaluation of wireless network access points. Appl. Comput. Syst. 21(1), 38\u201345 (2017). https:\/\/www.degruyter.com\/downloadpdf\/j\/acss.2017.21.issue-1\/acss-2017-0005\/acss-2017-0005.pdf","journal-title":"Applied Computer Systems"},{"issue":"9","key":"53_CR14","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Yulong Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016). https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7467419","journal-title":"Proceedings of the IEEE"},{"key":"53_CR15","unstructured":"Alblwi, S., Shujaee, K.: A survey on wireless security protocol WPA2. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2017). https:\/\/csce.ucmss.com\/cr\/books\/2017\/LFS\/CSREA2017\/SAM3445.pdf"},{"key":"53_CR16","doi-asserted-by":"crossref","unstructured":"Xia, L., Kumar, S., Yang, X., Gopalakrishnan, P., Liu, Y., Schoenberg, S., Guo, X.: Virtual WiFi: bring virtualization from wired to wireless. In: ACM SIGPLAN Notices, vol. 46, no. 7, pp. 181\u2013192. ACM, March 2011. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.362.2789&rep=rep1&type=pdf","DOI":"10.1145\/2007477.1952706"},{"issue":"3","key":"53_CR17","doi-asserted-by":"publisher","first-page":"497","DOI":"10.7840\/kics.2015.40.3.497","volume":"40","author":"Nam-Seh Lee","year":"2015","unstructured":"Lee, N.S., Lee, J.H., Jeong, C.K.: PS-Net: personalized secure Wi-Fi networks. J. Korean Inst. Commun. Inf. Sci. 40(3), 497\u2013505 (2015). http:\/\/www.koreascience.or.kr\/article\/JAKO201510665813311.page","journal-title":"The Journal of Korean Institute of Communications and Information Sciences"},{"key":"53_CR18","doi-asserted-by":"crossref","unstructured":"Chandra, R., Bahl, P.: MultiNet: connecting to multiple IEEE 802.11 networks using a single wireless card. In: IEEE INFOCOM 2004, vol. 2, pp. 882\u2013893. IEEE, March 2004. https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=1356976","DOI":"10.1109\/INFCOM.2004.1356976"}],"container-title":["Lecture Notes in Networks and Systems","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33506-9_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T20:27:27Z","timestamp":1695328047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33506-9_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,18]]},"ISBN":["9783030335052","9783030335069"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33506-9_53","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2019,10,18]]},"assertion":[{"value":"18 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antwerp","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}