{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:05:20Z","timestamp":1725613520217},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238864"},{"type":"electronic","value":"9783642238871"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23887-1_36","type":"book-chapter","created":{"date-parts":[[2011,9,24]],"date-time":"2011-09-24T01:10:54Z","timestamp":1316826654000},"page":"288-295","source":"Crossref","is-referenced-by-count":0,"title":["Authentication System That Mobile Terminal Serves as a Key Carrier"],"prefix":"10.1007","author":[{"given":"Jianping","family":"Gong","sequence":"first","affiliation":[]},{"given":"Yajuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Bingkai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","volume-title":"Network security principle and technology","author":"G. Feng","year":"2003","unstructured":"Feng, G.: Network security principle and technology. Science Press, China (2003)"},{"key":"36_CR2","volume-title":"Cryptography guide","author":"G. Feng","year":"1999","unstructured":"Feng, G., Pei, D.: Cryptography guide. Science Press, China (1999)"},{"key":"36_CR3","volume-title":"Modern cryptography","author":"L. Chen","year":"2002","unstructured":"Chen, L.: Modern cryptography. Science Press, China (2002)"},{"key":"36_CR4","unstructured":"Lai, X., et al.: Computer cryptography and its application. National Defence Industry Press (July 2001)"},{"key":"36_CR5","volume-title":"Computer network security tutorial","author":"Z. Shi","year":"2004","unstructured":"Shi, Z., et al.: Computer network security tutorial. Tsinghua University Press, Beijing (2004)"},{"key":"36_CR6","volume-title":"Actual encryption and decryption Raiders","author":"D. Guo","year":"2003","unstructured":"Guo, D., et al.: Actual encryption and decryption Raiders. Tsinghua University Press, Beijing (2003)"},{"key":"36_CR7","unstructured":"IEEE802.15, Bluetooth communication standard protocol"},{"key":"36_CR8","unstructured":"Bluetooth Special Interest Group, Specification of the Bluetooth System Core"},{"key":"36_CR9","unstructured":"Bluetooth Special Interest Group, Specification of the Bluetooth System Profile"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23887-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T15:32:35Z","timestamp":1554651155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23887-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238864","9783642238871"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23887-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}