{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:53:24Z","timestamp":1725677604092},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642299629"},{"type":"electronic","value":"9783642299636"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29963-6_15","type":"book-chapter","created":{"date-parts":[[2012,4,28]],"date-time":"2012-04-28T12:06:00Z","timestamp":1335614760000},"page":"207-222","source":"Crossref","is-referenced-by-count":0,"title":["Secure Architecure for the Integration of RFID and Sensors in Personal Networks"],"prefix":"10.1007","author":[{"given":"Pablo","family":"Najera","sequence":"first","affiliation":[]},{"given":"Rodrigo","family":"Roman","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"International Telecommunication Union, ITU Internet Reports: The Internet of Things (November 2005)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Yum, D.H., et al.: Distance Bounding Protocol for Mutual Authentication. IEEE Transactions on Wireless Communications, 592\u2013601 (2011)","DOI":"10.1109\/TWC.2010.120610.100491"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Alomair, B., Poovendran, R.: Privacy versus Scalability in Radio Frequency Identification Systems. Computer Communication (2010)","DOI":"10.1016\/j.comcom.2010.08.006"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., et al.: Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security. In: IEEE International Conference on RFID 2010, Orlando, USA, pp. 45\u201352 (2010)","DOI":"10.1109\/RFID.2010.5467258"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Anggraeni, P.N., Prasad, N.R., Prasad, R.: Secure personal network. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20135 (2008)","DOI":"10.1109\/PIMRC.2008.4699962"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Ibrohimovna, M., et al.: Secure and Dynamic Cooperation of Personal Networks in a Fednet. In: 6th IEEE CCNC 2009, pp. 8\u201314 (2009)","DOI":"10.1109\/CCNC.2009.4784818"},{"key":"15_CR7","unstructured":"Project IST-FP6-IP-027396, Magnet Beyond, http:\/\/magnet.aau.dk (last accessed March 2011)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Anggorjati, B., et al.: RFID Added Value Sensing Capabilities: European Advances in Integrated RFID-WSN Middleware. In: IEEE SECON 2010, pp. 1\u20133 (2010)","DOI":"10.1109\/SECON.2010.5508231"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Xiaoguang, Z., Wei, L.: The research of network architecture in warehouse management system based on RFID and WSN integration. In: IEEE International Conference on ICAL 2008, pp. 2556\u20132560 (2008)","DOI":"10.1109\/ICAL.2008.4636600"},{"key":"15_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-17587-9_17","volume-title":"Communication and Networking","author":"R.S. Tolentino","year":"2010","unstructured":"Tolentino, R.S., Lee, K., Kim, Y.-T., Park, G.-C.: Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network. In: Kim, T.-H., Chang, A.C.-C., Li, M., Rong, C., Patrikakis, C.Z., \u015al\u0119zak, D. (eds.) FGCN 2010. CCIS, vol.\u00a0119, pp. 147\u2013154. Springer, Heidelberg (2010)"},{"key":"15_CR11","unstructured":"Memsic WSN product family, http:\/\/www.memsic.com\/products\/wireless-sensor-networks.html (last accessed March 2011)"},{"key":"15_CR12","unstructured":"Google Nexus S, http:\/\/www.google.es\/nexus\/tech-specs (accessed on March 2011)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Dominikus, S., Schmidt, J.-M.: Connecting Passive RFID Tags to the Internet of Things. In: Interconnecting Smart Objects with the Internet Workshop, Prague (2011)","DOI":"10.1002\/sec.398"},{"key":"15_CR14","unstructured":"Yu Ng, C., et al.: Practical RFID Ownership Transfer Scheme. Journal of Computer Security - Special Issue on RFID System Security (2010)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.J.: Scalable RFID Security Protocols supporting Tag Ownership Transfer, Computer Communication. Elsevier (2010)","DOI":"10.1016\/j.comcom.2010.02.027"},{"key":"15_CR16","unstructured":"Kapoor, G., et al.: Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics, 1\u201310 (2011)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1278972.1278992","volume-title":"4th Workshop on Embedded Networked Sensors","author":"G. Mulligan","year":"2007","unstructured":"Mulligan, G.: The 6LoWPAN architecture. In: 4th Workshop on Embedded Networked Sensors, pp. 78\u201382. ACM, New York (2007)"},{"key":"15_CR18","first-page":"970","volume":"15","author":"P. Najera","year":"2009","unstructured":"Najera, P., Moyano, F., Lopez, J.: Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science\u00a015, 970\u2013991 (2009)","journal-title":"Journal of Universal Computer Science"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29963-6_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:05:24Z","timestamp":1606187124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29963-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642299629","9783642299636"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29963-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}