{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:51:09Z","timestamp":1742961069881,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_64","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"743-747","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Two-Way Communications Through Firewalls Using QLM Messaging"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Kubler","sequence":"first","affiliation":[]},{"given":"Manik","family":"Madhikermi","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Buda","sequence":"additional","affiliation":[]},{"given":"Kary","family":"Fr\u00e4mling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"issue":"4","key":"64_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/scientificamerican1004-76","volume":"291","author":"N Gershenfeld","year":"2004","unstructured":"Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet of Things. Sci. Am. 291(4), 76\u201381 (2004)","journal-title":"Sci. Am."},{"key":"64_CR2","first-page":"1","volume":"99","author":"C Perera","year":"2013","unstructured":"Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 99, 1\u201341 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Framling, K., Maharjan, M.: Standardized communication between intelligent products for the IoT. In: 11th IFAC Workshop on Intelligent Manufacturing Systems. S\u00e3o Paulo (2013)","DOI":"10.3182\/20130522-3-BR-4036.00043"},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Chen, L.: Application perspectives for active safety system based on internet of vehicles. In: Proceedings of the FISITA 2012 World Automotive Congress. Beijing (2012)","DOI":"10.1007\/978-3-642-33838-0_12"},{"issue":"3","key":"64_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.aei.2004.09.005","volume":"17","author":"D Kiritsis","year":"2003","unstructured":"Kiritsis, D., Bufardi, A., Xirouchakis, P.: Research issues on product lifecycle management and information tracking using smart embedded systems. Adv. Eng. Inform. 17(3), 189\u2013202 (2003)","journal-title":"Adv. Eng. Inform."},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Kubler, S., Madhikermi, M., Fr\u00e4mling, K.: Deferred retrieval of IoT information using QLM messaging interface. In: 10th International Conference on Mobile Web Information Systems. Paphos (2013)","DOI":"10.1007\/978-3-319-03737-0_7"},{"issue":"1","key":"64_CR7","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MSECP.2003.1176998","volume":"1","author":"M Bishop","year":"2003","unstructured":"Bishop, M.: What is computer security? IEEE Secur. Priv. 1(1), 67\u201369 (2003)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"64_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51\u201358 (2010)","journal-title":"IEEE Wirel. Commun."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:43:37Z","timestamp":1676411017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_64","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}