{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:27:09Z","timestamp":1747852029790},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642146534"},{"type":"electronic","value":"9783642146541"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14654-1_30","type":"book-chapter","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T08:02:22Z","timestamp":1282204942000},"page":"245-252","source":"Crossref","is-referenced-by-count":49,"title":["Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption"],"prefix":"10.1007","author":[{"given":"Namje","family":"Park","sequence":"first","affiliation":[]},{"given":"Youjin","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/11610496_100","volume-title":"Advanced Web and Network Technologies, and Applications","author":"N. Park","year":"2006","unstructured":"Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 741\u2013748. Springer, Heidelberg (2006)"},{"issue":"11","key":"30_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communication of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communication of the ACM"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/BFb0052348","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1997","unstructured":"Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 210\u2013218. Springer, Heidelberg (1997)"},{"key":"30_CR4","unstructured":"Dean, J.: Handling Large Datasets at Google: Current Systems and Future Directions. In: Data-Intensive Computing Symposium (2008)"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11872153_43","volume-title":"Personal Wireless Communications","author":"N. Park","year":"2006","unstructured":"Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol.\u00a04217, pp. 494\u2013505. Springer, Heidelberg (2006)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (3, n)-threshold secret sharing scheme using exclusive-or operations. IEICE Trans. Fundamentals\u00a0E91-A(1), 127\u2013138 (2008)","DOI":"10.1093\/ietfec\/e91-a.1.127"},{"key":"30_CR7","unstructured":"Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: fast (2, n)-threshold scheme and its application. In: Proc. CSS 2005, pp. 631\u2013636 (2005)"},{"key":"30_CR8","unstructured":"Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proc. CSS 2005, pp. 637\u2013642 (2005)"},{"issue":"417","key":"30_CR9","first-page":"15","volume":"103","author":"H. Kuwakado","year":"2003","unstructured":"Kuwakado, H., Tanaka, H.: Strongly non-separable encryption mode for throwing a media away. Technical Report of IEICE\u00a0103(417), 15\u201318 (2003)","journal-title":"Technical Report of IEICE"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-85886-7_31","volume-title":"Information Security","author":"J. Kurihara","year":"2008","unstructured":"Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 455\u2013470. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14654-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T20:14:28Z","timestamp":1552940068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14654-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642146534","9783642146541"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14654-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}