{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:55:29Z","timestamp":1743141329404,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270715"},{"type":"electronic","value":"9783319270722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27072-2_28","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:40:18Z","timestamp":1451374818000},"page":"219-225","source":"Crossref","is-referenced-by-count":0,"title":["Addressing Communication Security Issues in BAN Medical System: SIARS"],"prefix":"10.1007","author":[{"given":"Goce","family":"Stevanoski","sequence":"first","affiliation":[]},{"given":"Jugoslav","family":"Achkoski","sequence":"additional","affiliation":[]},{"given":"Saso","family":"Koceski","sequence":"additional","affiliation":[]},{"given":"Ana Madevska","family":"Bogdanova","sequence":"additional","affiliation":[]},{"given":"Mitko","family":"Bogdanoski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"28_CR1","unstructured":"ITU-T Recommendation X.805 Recommendation A.8: Security architecture for systems providing end-to-end communications, 29 October 2003"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-662-48051-9_18","volume-title":"Financial Cryptography and Data Security","author":"M Toorani","year":"2015","unstructured":"Toorani, M.: On vulnerabilities of the security association in the IEEE 802.15.6 standard. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015 Workshops. LNCS, vol. 8976, pp. 245\u2013260. Springer, Heidelberg (2015)"},{"key":"28_CR3","unstructured":"Ryan, M.: Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix! BlackHat USA, Las Vegas, USA (2013)"},{"key":"28_CR4","unstructured":"Association, T.I.S.: IEEE P802.15.6-2012 Standard for Wireless Body Area Networks (2012). \n                    http:\/\/standards.ieee.org\/findstds\/standard\/802.15.6-2012.html"},{"key":"28_CR5","unstructured":"Harris Corporation, Tactical Radio and Networking, RF7800M \u2013MP. \n                    http:\/\/rf.harris.com\/capabilities\/tactical-radios-networking\/rf-7800m\/default.asp"},{"key":"28_CR6","unstructured":"Bhasker, D.: 4G LTE security for mobile network operators. Cyber Secur. Inf. Sys. Inf. Anal. Cent. (CSIAC) 1(4), 20\u201329 (2013). \n                    https:\/\/www.csiac.org\/journal_article\/4g-lte-security-mobile-network-operators"},{"key":"28_CR7","unstructured":"3rd Generation Partnership Project: TS 33.401: System Architecture Evolution (SAE); Security architecture. Network, ver.12.14.0, release 12, 3GPP, April 2015"},{"key":"28_CR8","unstructured":"The National Telecommunications and Information Administration (NTIA) US Department of Commerce. \n                    http:\/\/www.ntia.doc.gov\/files\/ntia\/va_tech_response.pdf"},{"key":"28_CR9","unstructured":"Donegn, P.: The security vulnerabilities of LTE: Opportunity & Risks for Operators, Heavy Reading, October 2013"},{"key":"28_CR10","unstructured":"Harris Corporation: Radio Communication in the Digital Age. vol. 1, edn. 2 (2005)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27072-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:28:50Z","timestamp":1559356130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27072-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319270715","9783319270722"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27072-2_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}