{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:54:07Z","timestamp":1762505647959},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540242079"},{"type":"electronic","value":"9783540301141"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30114-1_17","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T18:47:16Z","timestamp":1284662836000},"page":"239-252","source":"Crossref","is-referenced-by-count":82,"title":["An Asymmetric Security Mechanism for Navigation Signals"],"prefix":"10.1007","author":[{"given":"Markus G.","family":"Kuhn","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Kallender, P.: Omron uses GPS to catch a car thief. EE Times, June 12 (2001), http:\/\/www.eetimes.com\/at\/news\/OEG20010612S0059"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Denning, D.E., MacDoran, P.F.: Location-based authentication: Grounding cyberspace for better security. Computer Fraud & Security, Elsevier, pp. 12\u201316 (February 1996), http:\/\/www.cosc.georgetown.edu\/~denning\/infosec\/Grounding.txt","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"17_CR3","unstructured":"Electronic tagging: A virtual prison? BBC News Online, January 7 (2000), http:\/\/news.bbc.co.uk\/1\/hi\/specialreport\/1999\/02\/99\/e-cyclopedia\/594314.stm"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Spilker Jr., J.J.: GPS signal structure and theoretical performance. In: Parkinson, B.W., Spilker Jr., J.J. (eds.) Global Positioning System: Theory and Applications, Washington DC. Progress in Astronautics and Aeronautics, American Institute of Aeronautics and Astronautics, vol.\u00a0I, 163 (1996) ISBN 1-56347-106-X","DOI":"10.2514\/5.9781600866388.0057.0119"},{"key":"17_CR5","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. CryptoBytes, Vol. 5, No. 2, pp. 2\u201313, RSA Laboratories (Summer\/Fall 2002)"},{"key":"17_CR6","unstructured":"Radio noise. Recommendation ITU-R P.372-7, International Telecommunication Union, Geneva (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30114-1_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:40:50Z","timestamp":1605760850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30114-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540242079","9783540301141"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30114-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}