{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:21Z","timestamp":1725511641427},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540788485"},{"type":"electronic","value":"9783540788492"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78849-2_34","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T09:49:01Z","timestamp":1209376141000},"page":"331-341","source":"Crossref","is-referenced-by-count":18,"title":["Multilateral Approaches to the Mobile RFID Security Problem Using Web Service"],"prefix":"10.1007","author":[{"given":"Namje","family":"Park","sequence":"first","affiliation":[]},{"given":"Youjin","family":"Song","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]},{"given":"Howon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"34_CR1","first-page":"188","volume":"1","author":"T. Tsuji","year":"2004","unstructured":"Tsuji, T., Kouno, S., Noguchi, J., Iguchi, M., Misu, N., Kawamura, M.: Asset management solution based on RFID. NEC Journal of Advanced Technology\u00a01(3), 188\u2013193 (2004)","journal-title":"NEC Journal of Advanced Technology"},{"key":"34_CR2","unstructured":"Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO\/IEC JTC 1\/SC 31\/WG 4 N 0922, Information paper, ISO\/IEC JTC 1 SC 31 WG4 SG 5 (2005)"},{"issue":"4","key":"34_CR3","doi-asserted-by":"crossref","first-page":"465","DOI":"10.4218\/etrij.05.0204.0072","volume":"27","author":"S. Jin","year":"2005","unstructured":"Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal\u00a027(4), 465\u2013468 (2005)","journal-title":"ETRI Journal"},{"key":"34_CR4","volume-title":"RFID systems, security and privacy implications","author":"S.E. Sarma","year":"2002","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT Press, Cambridge (2002)"},{"issue":"2","key":"34_CR5","doi-asserted-by":"crossref","first-page":"216","DOI":"10.4218\/etrij.06.0205.0082","volume":"28","author":"W. Choi","year":"2006","unstructured":"Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal\u00a028(2), 216\u2013218 (2006)","journal-title":"ETRI Journal"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Weis, S., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems. In: First International Conference on Security in Pervasive Computing (SPC) (2003)","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"34_CR7","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. In: RFID Privacy Workshop (2003)"},{"key":"34_CR8","unstructured":"W. Park, B. Lee: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)"},{"key":"34_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/11610496_100","volume-title":"Advanced Web and Network Technologies, and Applications","author":"N. Park","year":"2006","unstructured":"Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 741\u2013748. Springer, Heidelberg (2006)"},{"key":"34_CR10","unstructured":"MRF Forum: WIPI C API Standard for Mobile RFID Reader (2005)"},{"key":"34_CR11","unstructured":"MRF Forum: WIPI Network APIs for Mobile RFID Services (2005)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11872153_43","volume-title":"Personal Wireless Communications","author":"N. Park","year":"2006","unstructured":"Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol.\u00a04217, pp. 494\u2013505. Springer, Heidelberg (2006)"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1007\/b137120","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"N. Park","year":"2005","unstructured":"Park, N., Kim, H., Kim, S., Won, D.: Open Location-based Service using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 1146\u20131155. Springer, Heidelberg (2005)"},{"key":"34_CR14","unstructured":"Lee, J., Kim, H.: RFID Code Structure and Tag Data Structure for Mobile RFID Services in Korea. In: Proceedings of ICACT (2006)"},{"key":"34_CR15","unstructured":"B. Chug, et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM17D116E, Q9\/17, Contribution 116, Geneva. (2005)"},{"key":"34_CR16","first-page":"151","volume-title":"ASC (Advances in Soft Computing)","author":"N. Park","year":"2007","unstructured":"Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: ASC (Advances in Soft Computing), vol.\u00a043, pp. 151\u2013156. Springer, Heidelberg (2007)"},{"key":"34_CR17","unstructured":"Kim, Y., Lee, J., Yoo, S., Kim, H.: A Network Reference Model for B2C RFID Applications. In: Proceedings of ICACT (2006)"}],"container-title":["Lecture Notes in Computer Science","Progress in WWW Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78849-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:25:55Z","timestamp":1558265155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78849-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540788485","9783540788492"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78849-2_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}