{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:44:26Z","timestamp":1725878666846},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319512334"},{"type":"electronic","value":"9783319512341"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-51234-1_29","type":"book-chapter","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T22:29:13Z","timestamp":1484864953000},"page":"165-170","source":"Crossref","is-referenced-by-count":3,"title":["Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Wearing","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,21]]},"reference":[{"key":"29_CR1","unstructured":"Pantelopoulos, A., Bourbakis, N.G.: A survey on wearable sensor-based systems for health monitoring, prognosis. IEEE Trans. Syst. Man Cybern. Part C (Applications, Reviews) 40(1), 1\u201312 (2010)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Tsukiyama, T.: In-home health monitoring system for solitary elderly. In: Proceedings of EUSPN\/ICTH\u201915, Procedia Computer Science, vol. 63, 229\u2013235 (2015)","DOI":"10.1016\/j.procs.2015.08.338"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proceedings of SPIMACS\u201909. ACM (2009)","DOI":"10.1145\/1655084.1655086"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Dasios, A., Gavalas, D., Pantziou, G., Konstantopoulos, C.: Wireless sensor network deployment for remote elderly care monitoring. In: Proceedings of PETRA\u201915. ACM (2015)","DOI":"10.1145\/2769493.2769539"},{"key":"29_CR5","unstructured":"Contiki Pull Request Containing A.E.S. Encryption, July 2016. https:\/\/github.com\/contiki-os\/contiki\/pull\/557"},{"key":"29_CR6","unstructured":"Dworkin, M.: NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality 2002, July 2016. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38a\/spp.800-38a.pdf"},{"key":"29_CR7","unstructured":"SQLite Encryption Extension: Documentation, July 2016. https:\/\/www.sqlite.org\/see"},{"key":"29_CR8","unstructured":"Bloomberg: Your Medical Records Are for Sale, July 2016. http:\/\/www.bloomberg.com\/news\/articles\/2013-08-08\/your-medical-records-are-for-sale"},{"key":"29_CR9","unstructured":"SQLite, July 2016. https:\/\/www.sqlite.org\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Things Technologies for HealthCare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51234-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:41:13Z","timestamp":1498365673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51234-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319512334","9783319512341"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51234-1_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}