{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T19:10:08Z","timestamp":1747163408226,"version":"3.40.5"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_4","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"54-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["PIONEER\u2014a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag"],"prefix":"10.1007","author":[{"given":"Hannes","family":"Gross","sequence":"first","affiliation":[]},{"given":"Erich","family":"Wenger","sequence":"additional","affiliation":[]},{"given":"Honorio","family":"Mart\u00edn","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M Agren","year":"2011","unstructured":"Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wire. Mob. Comput. 5(1), 48\u201359 (2011)","journal-title":"Int. J. Wire. Mob. Comput."},{"key":"4_CR2","unstructured":"ANSI. Public Key Cryptography for the Financial Services Industry - Key Agreement and Key Transport Using Elliptic Curve Cryptography. Accredited Standards Committee X9 (2001) (Incorporated)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Arbit, A., Oren, Y., Wool, A.: Toward practical public key anti-counterfeiting for low-cost EPC tags. In: RFID, pp. 184\u2013191. IEEE, April 2011","DOI":"10.1109\/RFID.2011.5764620"},{"key":"4_CR4","unstructured":"Ashton, K.: That \u2018Internet of Things\u2019 Thing (2009). http:\/\/www.rfidjournal.com\/articles\/view?4986. Accessed 18 Feb 2014"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-36140-1_2","volume-title":"Radio Frequency Identification","author":"G Avoine","year":"2013","unstructured":"Avoine, G., Carpent, X.: Yet another ultralightweight authentication protocol that is broken. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 20\u201330. Springer, Heidelberg (2013)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Romdhane, M., Graba, T., Danger, J.-L., Mathieu, Y.: Design methodology of an ASIC TRNG based on an open-loop delay chain. In: IEEE International Workshops on New Circuits and Systems Conference (NEWCAS), pp. 1\u20134, June 2013","DOI":"10.1109\/NEWCAS.2013.6573654"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chang, Y.-C., Chen, J.-L., Lin, Y.-S., Wang, S.M.: RFIPv6 - a novel IPv6-EPC bridge mechanism. In: International Conference on Consumer Electronics - ICCE, pp. 1\u20132 (2008)","DOI":"10.1109\/ICCE.2008.4587956"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-40349-1_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"A Cherkaoui","year":"2013","unstructured":"Cherkaoui, A., Fischer, V., Fesquet, L., Aubert, A.: A very high speed true random number generator with entropy assessment. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 179\u2013196. Springer, Heidelberg (2013)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/10721064_26","volume-title":"Smart Card. Research and Applications","author":"J Daemen","year":"2000","unstructured":"Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 277\u2013284. Springer, Heidelberg (2000)"},{"key":"4_CR12","unstructured":"Dominikus, S., Aigner, M., Kraxberger, S.: Passive RFID technology for the internet of things. In: International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1\u20138 (2010)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Dominikus, S., Kraxberger, S.: Secure Communication with RFID tags in the Internet of Things. Secur. Commun. Netw., n\/a\u2013n\/a (2011). http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.398\/abstract","DOI":"10.1002\/sec.398"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Methods and Techniques. NIST (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Engels, D., Kang, Y.S., Wang, J.: On security with the new Gen2 RFID security framework. In: 2013 IEEE International Conference on RFID (RFID), pp. 144\u2013151 (2013)","DOI":"10.1109\/RFID.2013.6548148"},{"key":"4_CR16","unstructured":"EPCglobal. EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface Protocol for Communication at 860 MHz - 960 MHz Version 2.0.0 Ratified, November 2013. http:\/\/www.gs1.org"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Ertl, J., Plos, T., Feldhofer, M., Felber, N., Henzen, L.: A security-enhanced UHF RFID tag chip. In: Euromicro Conference on Digital System Design (DSD), pp. 705\u2013712 (2013)","DOI":"10.1109\/DSD.2013.80"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEEE Proc. Inf. Secur. 152(1), 13\u201320 (2005)","journal-title":"IEEE Proc. Inf. Secur."},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s00145-006-0224-0","volume":"19","author":"M Girault","year":"2006","unstructured":"Girault, M., Poupard, G., Stern, J., Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. cryptology 19, 463\u2013487 (2006)","journal-title":"J. cryptology"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-540-88313-5_18","volume-title":"Computer Security - ESORICS 2008","author":"J Ha","year":"2008","unstructured":"Ha, J., Moon, S., Zhou, J., Ha, J.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267\u2013281. Springer, Heidelberg (2008)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Hada, H., Mitsugi, J.: EPC based internet of things architecture. In: IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 527\u2013532 (2011)","DOI":"10.1109\/RFID-TA.2011.6068595"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Hinz, W., Finkenzeller, K., Seysen, M.: Secure UHF tags with strong cryptography - development of ISO\/IEC 18000\u201363 compatible secure RFID tags and presentation of first results. In: SENSORNETS, pp. 5\u201313 (2013)","DOI":"10.5220\/0004194800050013"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Holleman, J., Otis, B., Bridges, S., Mitros, A., Diorio, C.: A 2.92 uW hardware random number generator. In: European Solid-State Circuits Conference, pp. 134\u2013137 (2006)","DOI":"10.1109\/ESSCIR.2006.307549"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-21969-6_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"M Hutter","year":"2011","unstructured":"Hutter, M., Joye, M., Sierra, Y.: Memory-constrained implementations of elliptic curve cryptography in Co-Z coordinate representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170\u2013187. Springer, Heidelberg (2011)"},{"key":"4_CR25","unstructured":"IANA - Internet Assigned Numbers Authority. Referenced 2014 at http:\/\/www.iana.org\/assignments\/ikev2-parameters\/ikev2-parameters.xhtml"},{"key":"4_CR26","unstructured":"ISO - International Organization for Standardization. Referenced 2014 at http:\/\/www.iso.org\/"},{"issue":"6","key":"4_CR27","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1049\/el:19880226","volume":"24","author":"T Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: Effective recursive algorithm for computing multiplicative inverses in $$GF(2^m)$$. Electron. Lett. 24(6), 334\u2013335 (1988)","journal-title":"Electron. Lett."},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol Version 2 (IKEv2). RFC 5996 (Proposed Standard), Sept 2010. Updated by RFCs 5998, 6989","DOI":"10.17487\/rfc5996"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), Dec 2005. Updated by RFC 6040","DOI":"10.17487\/rfc4301"},{"issue":"6","key":"4_CR31","doi-asserted-by":"publisher","first-page":"2922","DOI":"10.1109\/TIE.2013.2278519","volume":"61","author":"J-W Lee","year":"2014","unstructured":"Lee, J.-W., Phan, N.D., Vo, D.H.-T., Duong, V.-H.: A fully integrated EPC Gen-2 UHF-band passive tag IC using an efficient power management technique. IEEE Trans. Industr. Electron. 61(6), 2922\u20132932 (2014)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-01516-8_20","volume-title":"Pervasive Computing","author":"M Lehtonen","year":"2009","unstructured":"Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291\u2013308. Springer, Heidelberg (2009)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Kent, S.: Additional Diffie-Hellman Groups for Use with IETF Standards. RFC 5114 (Informational), Jan 2008","DOI":"10.17487\/rfc5114"},{"key":"4_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-17226-7_15","volume-title":"From Active Data Management to Event-Based Systems and More","author":"F Mattern","year":"2010","unstructured":"Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. In: Sachs, K., Petrov, I., Guerrero, P. (eds.) Buchmann Festschrift. LNCS, vol. 6462, pp. 242\u2013259. Springer, Heidelberg (2010)"},{"key":"4_CR35","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography, 1st edn. CRC Press Inc., Boca Raton (1996)","edition":"1"},{"issue":"170","key":"4_CR36","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"4_CR37","unstructured":"National Institute of Standards and Technology (NIST). FIPS-186-3: Digital Signature Standard (DSS) (2009). http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Noman, A., Rahman, M., Adams, C.: Improving security and usability of low cost RFID tags. In: International Conference on Privacy, Security and Trust (PST), pp. 134\u2013141 (2011)","DOI":"10.1109\/PST.2011.5971975"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Pang, L., He, L., Pei, Q., Wang, Y.: Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. In: Wireless Communications and Networking Conference (WCNC), pp. 1870\u20131875 (2013)","DOI":"10.1109\/WCNC.2013.6554849"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework. In: IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 2, pp. 159\u2013166 (2008)","DOI":"10.1109\/EUC.2008.82"},{"key":"4_CR41","unstructured":"Rabin, M.O.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization. Technical report, Cambridge, MA, USA (1979)"},{"key":"4_CR42","unstructured":"Ranasinghe, D.C., Limb, D., Devadas, S., Jamali, B., Zhu, Z., Cole, P. H.: An Efficient Hardware Random Number Generator"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2011) (2011)","DOI":"10.1109\/DCOSS.2011.5982177"},{"issue":"2","key":"4_CR44","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2001). http:\/\/csrc.nist.gov\/rng\/","DOI":"10.6028\/NIST.SP.800-22"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Safkhani, M., Bagheri, N., Peris-Lopez, P., Mitrokotsa, A., Hernandez-Castro, J.: Weaknesses in Another Gen2-based RFID Authentication Protocol. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 80\u201384 (2012)","DOI":"10.1109\/RFID-TA.2012.6404572"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Sample, A., Yeager, D., Powledge, P., Smith, J.: Design of a passively-powered, programmable sensing platform for UHF RFID systems. In: IEEE International Conference on RFID, pp. 149\u2013156, March 2007","DOI":"10.1109\/RFID.2007.346163"},{"key":"4_CR48","unstructured":"Sarma, S., Brock, D.L., Ashton, K.: White Paper: The Networked Physical World (2000). http:\/\/www.autoidlabs.org\/uploads\/media\/MIT-AUTOID-WH-001.pdf. Accessed 18 Feb 2014"},{"key":"4_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-36400-5_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"W Schindler","year":"2003","unstructured":"Schindler, W., Killmann, W.: Evaluation criteria for true (physical) random number generators used in cryptographic applications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 431\u2013449. Springer, Heidelberg (2003)"},{"key":"4_CR50","unstructured":"strongSwan - the OpenSource IPsec-based VPN Solution. Referenced 2014 at http:\/\/www.strongswan.org\/"},{"issue":"4","key":"4_CR51","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TCE.2012.6414992","volume":"58","author":"D-Z Sun","year":"2012","unstructured":"Sun, D.-Z., Zhong, J.-D.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246\u20131252 (2012)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"4_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-662-44709-3_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"T Unterluggauer","year":"2014","unstructured":"Unterluggauer, T., Wenger, E.: Efficient pairings and ECC for embedded systems. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 298\u2013315. Springer, Heidelberg (2014)"},{"key":"4_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-38980-1_18","volume-title":"Applied Cryptography and Network Security","author":"E Wenger","year":"2013","unstructured":"Wenger, E.: Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 290\u2013306. Springer, Heidelberg (2013)"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Wenger, E., Baier, T., Feichtner, J.: JAAVR: introducing the next generation of security-enabled RFID tags. In: Niar, S. (ed.) Digital System Design, pp. 640\u2013647. IEEE (2012)","DOI":"10.1109\/DSD.2012.81"},{"key":"4_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-03515-4_16","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"E Wenger","year":"2013","unstructured":"Wenger, E., Unterluggauer, T., Werner, M.: 8\/16\/32 shades of elliptic curve cryptography on embedded processors. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 244\u2013261. Springer, Heidelberg (2013)"},{"key":"4_CR56","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1016\/j.phpro.2012.02.206","volume":"24, Part B","author":"X Yi","year":"2012","unstructured":"Yi, X., Wang, L., Mao, D., Zhan, Y.: An Gen2 based security authentication protocol for RFID system. Phys. Procedia 24, Part B, 1385\u20131391 (2012). (International Conference on Applied Physics and Industrial Engineering 2012)","journal-title":"Phys. Procedia"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:31:39Z","timestamp":1747161099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}