{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:10Z","timestamp":1725541570528},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_36","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"289-297","source":"Crossref","is-referenced-by-count":7,"title":["Symmetric-Key Encryption for Wireless Internet SCADA"],"prefix":"10.1007","author":[{"given":"Rosslin John","family":"Robles","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min-Kyu","family":"Choi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Wikipedia, Wireless, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Wireless"},{"key":"36_CR2","unstructured":"Hildick-Smith, A.: Security for Critical Infrastructure SCADA Systems. techFAQ \"What is SCADA? (2005), \n                  \n                    http:\/\/www.tech-faq.com\/scada.shtml\n                  \n                  \n                 (accessed: May 2008)"},{"key":"36_CR3","unstructured":"BENTEK SYSTEMS, Wireless SCADA, \n                  \n                    http:\/\/www.scadalink.com\/support\/wireless_scada.html\n                  \n                  \n                 (accessed: May 2008)"},{"key":"36_CR4","unstructured":"Wallace, D.: Control Engineering. How to put SCADA on the Internet (2003), \n                  \n                    http:\/\/www.controleng.com\/article\/CA321065.html\n                  \n                  \n                 (accessed: January 2009)"},{"key":"36_CR5","unstructured":"Internet and Web-based SCADA, \n                  \n                    http:\/\/www.scadalink.com\/technotesIP.htm\n                  \n                  \n                 (accessed: January 2009)"},{"key":"36_CR6","unstructured":"Maynor, D., Graham, R.: SCADA Security and Terrorism: We\u2019re Not Crying Wolf, \n                  \n                    http:\/\/www.blackhat.com\/presentations\/bh-federal-06\/BH-Fed-06-Maynor-Graham-up.pdf\n                  \n                  \n                 (accessed: January 2009)"},{"key":"36_CR7","unstructured":"Lemos, R.: SCADA system makers pushed toward security (2006-07-26), \n                  \n                    http:\/\/www.securityfocus.com\/news\/11402\n                  \n                  \n                 (accessed: January 2009)"},{"key":"36_CR8","unstructured":"Wikipedia, Symmetric-key algorithm, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Symmetric_cipher\n                  \n                  \n                 (accessed: June 2009)"},{"key":"36_CR9","unstructured":"RSA LAboratories \"What is RC4?\", \n                  \n                    http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2250\n                  \n                  \n                 (accessed: June 2009)"},{"key":"36_CR10","unstructured":"Wikipedia \"RC4\", \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/RC4"},{"key":"36_CR11","unstructured":"\"RC4\", \n                  \n                    http:\/\/www.wisdom.weizmann.ac.il\/~itsik\/RC4\/rc4.html\n                  \n                  \n                 (accessed: June 2009)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:42:45Z","timestamp":1619768565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}