{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:20Z","timestamp":1725548300767},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_38","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"829-850","source":"Crossref","is-referenced-by-count":0,"title":["Technological and Legal Aspects of CIS"],"prefix":"10.1007","author":[{"given":"Peter","family":"Stavroulakis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"P. Stavroulakis (Ed.): Communication and information security, special issue, China Communication (February 2007)"},{"key":"38_CR2","volume-title":"Terrestrial Trunked Radio \u2013 TETRA. A Global Security Tool","author":"P. Stavroulakis","year":"2007","unstructured":"P.\u00a0Stavroulakis: Terrestrial Trunked Radio \u2013 TETRA. A Global Security Tool (Springer, Berlin 2007)"},{"key":"38_CR3","unstructured":"D. Reed: Applying the OSI seven layer network model to information security, Sans Institute (November 2003)"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","volume-title":"Proceedings of the 2nd Workshop on Information Hiding","author":"M.G. Kuhn","year":"1998","unstructured":"M.G.\u00a0Kuhn, R.J.\u00a0Anderson: Soft tempest: hidden data transmission using electromagnetic emanations. In: Proceedings of the 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1525, ed. by D.\u00a0Aucsmith (Springer, Berlin Heidelberg 1998) pp. 124\u2013142"},{"key":"38_CR5","unstructured":"N.G. Bardis, A.P. Markovskyy: Utilization of avalanche transformation for increasing of echoplex and checksum data transmission control reliability, ISITA 2004 \u2013 Int. Symposium on Information Theory and its Applications, Parma, Italy, 10\u201313 October 2004 (2004)"},{"key":"38_CR6","unstructured":"S. Rouiller: Virtual LAN security: weaknesses and countermeasures, Technical Report (SANS Institute, 2003)"},{"issue":"12","key":"38_CR7","first-page":"1235","volume":"7","author":"N. Doukas","year":"2008","unstructured":"N.\u00a0Doukas, N.V.\u00a0Karadimas: A blind source separation based cryptography scheme for mobile military communication applications, WSEAS Trans. Commun. 7(12), 1235\u20131245 (2008)","journal-title":"WSEAS Trans. Commun."},{"issue":"1","key":"38_CR8","first-page":"99","volume":"12","author":"N.G. Bardis","year":"2004","unstructured":"N.G.\u00a0Bardis, A.\u00a0Polymenopoulos, E.G.\u00a0Bardis, A.P.\u00a0Markovskyy: Methods for increasing the efficiency of the remote user authentication in integrated systems, Trends Comput. Sci. 12(1), 99\u2013107 (2004)","journal-title":"Trends Comput. Sci."},{"issue":"1","key":"38_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1011132312956","volume":"16","author":"C. Ellison","year":"2000","unstructured":"C.\u00a0Ellison, B.\u00a0Schneier: Ten risks of PKI: what you\u2019re not being told about public key infrastructure, Comput. Secur. J. 16(1), 1\u20137 (2000)","journal-title":"Comput. Secur. J."},{"key":"38_CR10","unstructured":"N. Doukas, N.G. Bardis: Effectiveness data transmission error detection using check sum control for military applications, 10th WSEAS Int. Conference on Mathematical Methods, Computational Techniques and Intelligent Systems (MAMECTIS\u201908), Corfu Island, Greece, 26\u201328 October 2008 (2008)"},{"issue":"7","key":"38_CR11","first-page":"363","volume":"4","author":"N.G. Bardis","year":"2005","unstructured":"N.G.\u00a0Bardis, E.G.\u00a0Bardis, A.P.\u00a0Markovskyy, C.\u00a0Economou: Hardware implementation of data transmission control based on boolean transformation, WSEAS Trans. Commun. 4(7), 363\u2013371 (2005)","journal-title":"WSEAS Trans. Commun."},{"key":"38_CR12","first-page":"294","volume":"3","author":"N.G. Bardis","year":"2008","unstructured":"N.G.\u00a0Bardis, N.\u00a0Doukas, K.\u00a0Ntaikos: A new approach of secret key management lifecycle for military applications, WSEAS Trans. Comp. Res. 3, 294\u2013304 (2008)","journal-title":"WSEAS Trans. Comp. Res."},{"issue":"12","key":"38_CR13","first-page":"1741","volume":"5","author":"N.G. Bardis","year":"2008","unstructured":"N.G.\u00a0Bardis: Coding of checksum components for increasing the control reliability of data transmission for military applications, WSEAS Trans. Inf. Sci. Appl. 5(12), 1741\u20131750 (2008)","journal-title":"WSEAS Trans. Inf. Sci. Appl."},{"key":"38_CR14","unstructured":"T. Karygiannis, L. Owens: Wireless network security, Special Publication 800-48 (National Institute of Standards and Technology, November 2002)"},{"key":"38_CR15","unstructured":"An introduction to computer security, the NIST Handbook, Special Publication 800-12 (National Institute of Standards and Technology, October 1995)"},{"issue":"6","key":"38_CR16","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"A.\u00a0Perrig, J.\u00a0Stankovic, D.\u00a0Wagner: Security in wireless sensor networks, Commun. ACM 47(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"key":"38_CR17","unstructured":"A.C. Brainos: Secure communications in space, Technical Report (University of East Carolina, 2007)"},{"key":"38_CR18","unstructured":"D. Wolter: Common security in outer space and international law, UNIDIR 29 2006 (United Nations, 2005)"},{"key":"38_CR19","unstructured":"A. Burns: Legal aspects of open public networks, Network Commons"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"J.M.\u00a0Oberding, T.\u00a0Norderhaug: A separate jurisdiction for cyberspace?, J. Computer-Mediat. Commun. 2(1) (1996), available at http:\/\/jcmc.indiana.edu\/vol2\/issue1\/juris.html","DOI":"10.1111\/j.1083-6101.1996.tb00186.x"},{"issue":"3","key":"38_CR21","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1093\/ijlit\/ean002","volume":"16","author":"L.E. Gillies","year":"2008","unstructured":"L.E.\u00a0Gillies: Targeting the jurisdiction of an electronic consumer contract, Int. J. Law Inf. Technol. 16(3), 242\u2013269 (2008)","journal-title":"Int. J. Law Inf. Technol."},{"key":"38_CR22","first-page":"241","volume":"20","author":"B.D. Boone","year":"2006","unstructured":"B.D.\u00a0Boone: Bullseye! Why a \u201ctargeting\u201d approach to personal jurisdiction in the e-commerce context makes sense internationally, Emory Int. Law Rev. 20, 241\u2013289 (2006)","journal-title":"Emory Int. Law Rev."},{"key":"38_CR23","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/S0267-3649(00)89134-7","volume":"16","author":"L.A. Bygrave","year":"2000","unstructured":"L.A.\u00a0Bygrave: Determining applicable law pursuant to european data protection legislation, Comput. Law Secur. Rep. 16, 252\u2013257 (2000)","journal-title":"Comput. Law Secur. Rep."},{"key":"38_CR24","unstructured":"P.P. McDonald: National strategy to combat identity theft, NCJ No. 214,621 (May 2006)"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MEMB.2002.1044157","volume":"21","author":"L. Kun","year":"2002","unstructured":"L.\u00a0Kun: Homeland security: the possible, probable, and perils of information technology, IEEE Eng. Med. Biol. Mag. 21, 28\u201333 (2002)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MEMB.2002.1044168","volume":"21","author":"L. Kun","year":"2002","unstructured":"L.\u00a0Kun: Information infrastructure tools for bioterrorism preparedness, IEEE Eng. Med. Biol. Mag. 21, 69\u201385 (2002)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"38_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MEMB.2004.1297190","volume":"23","author":"M. Kikuchi","year":"2004","unstructured":"M.\u00a0Kikuchi: Biomedical engineering\u2019s contribution to defending the homeland, IEEE Eng. Med. Biol. Mag. 23, 75\u2013186 (2004)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"38_CR28","doi-asserted-by":"crossref","unstructured":"E. Kyriacou et al.: Multi-purpose healthcare telemedicine system with mobile communication link support, available at http:\/\/www.biomedical-engineering-online.com\/content\/2\/1\/7","DOI":"10.1186\/1475-925X-2-7"},{"key":"38_CR29","first-page":"38","volume":"39","author":"A.E. Bretz","year":"2002","unstructured":"A.\u00a0Elizabeth Bretz: 9\/11 one year later, Spectrum Mag. 39, 38 (2002)","journal-title":"Spectrum Mag."},{"key":"38_CR30","series-title":"Studies in Health Technology Informatics","volume-title":"Advanced Health Telematics and Telemedicine","author":"A. Georgoulis","year":"2003","unstructured":"A.\u00a0Georgoulis: RESHEN, a best practice approach for secure healthcare networks in Europe. In: Advanced Health Telematics and Telemedicine, Studies in Health Technology and Informatics, Vol. 96, ed. by B.\u00a0Blobel, P.\u00a0Pharow (IOS, Amsterdam 2003)"},{"key":"38_CR31","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MEMB.2002.1044155","volume":"21","author":"S. Luxminarayan","year":"2002","unstructured":"S.\u00a0Luxminarayan: Combating bioterrorism with bioengineering, IEEE Eng. Med. Biol. Mag. 21, 21\u201327 (2002)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"38_CR32","doi-asserted-by":"crossref","unstructured":"E. Lamprinos: A low power medium access control protocol for wireless medical sensor networks, Proc. 26th IEEE EMBS Conference, San Francisco, USA (2004)","DOI":"10.1109\/IEMBS.2004.1403624"},{"key":"38_CR33","unstructured":"T. Berg: State criminal jurisdiction in cyberspace: is there a sheriff on the electronic frontier? available at http:\/\/www.michbar.org\/journal\/article.cfm?articleID=94&volumeID=8 (25 November 2007)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T18:00:49Z","timestamp":1635012049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_38","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}