{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:55Z","timestamp":1725516655631},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314780"},{"type":"electronic","value":"9783642314797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31479-7_48","type":"book-chapter","created":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T04:10:15Z","timestamp":1344485415000},"page":"280-286","source":"Crossref","is-referenced-by-count":11,"title":["Privacy Implications of the Internet of Things"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Gudymenko","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Borcea-Pfitzmann","sequence":"additional","affiliation":[]},{"given":"Katja","family":"Tietze","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw.\u00a054, 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"issue":"4","key":"48_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MIC.2008.79","volume":"12","author":"J.W. Hui","year":"2008","unstructured":"Hui, J.W., Culler, D.E.: Extending IP to low-power, wireless personal area networks. IEEE Internet Computing\u00a012(4), 37\u201345 (2008)","journal-title":"IEEE Internet Computing"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Krikorian, R., Gershenfeld, N., Cohen, D.: The Internet of Things. Scientific American, 76\u201381 (October 2004)","DOI":"10.1038\/scientificamerican1004-76"},{"issue":"3","key":"48_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MIC.2009.52","volume":"13","author":"E. Welbourne","year":"2009","unstructured":"Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing\u00a013(3), 48\u201355 (2009)","journal-title":"IEEE Internet Computing"},{"key":"48_CR5","unstructured":"Gudymenko, I., Borcea-Pfitzmann, K.: A Framework for Transforming Abstract Privacy Models into Implementable System Requirements. In: 1st International Workshop on Model-based Interactive Ubiquitous Systems (2011)"},{"key":"48_CR6","unstructured":"Benetton to tag 15 million items (March 2003), \n                    \n                      http:\/\/www.rfidjournal.com\/article\/view\/344\n                    \n                    \n                   (accessed on July 18, 2011)"},{"key":"48_CR7","unstructured":"Gonsalves, A.: Privacy concerns hinder RFID rollout (January 2000), \n                    \n                      http:\/\/www.itnews.com.au\/News\/11417,privacy-concerns-hinder-rfid-rollout.aspx\n                    \n                    \n                   (accessed on July 18, 2011)"},{"issue":"1","key":"48_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R.H. Weber","year":"2010","unstructured":"Weber, R.H.: Internet of things - new security and privacy challenges. Computer Law & Security Review\u00a026(1), 23\u201330 (2010)","journal-title":"Computer Law & Security Review"},{"key":"48_CR9","unstructured":"Report: Privacy and data protection impact assessment framework for RFID applications (January 2011) (accessed on May 25, 2011)"},{"key":"48_CR10","unstructured":"Cavoukian, A.: Privacy by Design. Take a challenge. Electronic Resource (2009), \n                    \n                      http:\/\/www.privacybydesign.ca\/content\/uploads\/2010\/03\/PrivacybyDesignBook.pdf"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). Internet Ingineering Task Force (2003)","DOI":"10.17487\/rfc3610"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Schelby, Z., Bormann, C.: 6LoWPAN: the Wireless Embedded Internet. Wiley (2009)","DOI":"10.1002\/9780470686218"},{"key":"48_CR13","unstructured":"European Parliament and Council Directive: Directive 2002\/58\/EC of the European Parliament and of the Council: concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities (2002)"},{"issue":"3","key":"48_CR14","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MVT.2009.933478","volume":"4","author":"I. Cha","year":"2009","unstructured":"Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Vehicular Technology Magazine\u00a04(3), 69\u201375 (2009)","journal-title":"IEEE Vehicular Technology Magazine"},{"issue":"4","key":"48_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","volume":"49","author":"G. Wu","year":"2011","unstructured":"Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.D.: M2M: From mobile to embedded internet. IEEE Communications Magazine\u00a049(4), 36\u201343 (2011)","journal-title":"IEEE Communications Magazine"},{"issue":"12","key":"48_CR16","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1109\/PROC.1983.12775","volume":"71","author":"J.D. Day","year":"1983","unstructured":"Day, J.D., Zimmermann, H.: The OSI reference model. Proceedings of the IEEE\u00a071(12), 1334\u20131340 (1983)","journal-title":"Proceedings of the IEEE"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Cichon, J., Klonowski, M., Kutylowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 235\u2013240 (March 2007)","DOI":"10.1109\/PERCOMW.2007.96"},{"key":"48_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-21040-2_10","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M. Hutter","year":"2011","unstructured":"Hutter, M., Feldhofer, M., Wolkerstorfer, J.: A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 144\u2013159. Springer, Heidelberg (2011)"},{"key":"48_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-21969-6_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"M. Hutter","year":"2011","unstructured":"Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 170\u2013187. Springer, Heidelberg (2011)"},{"key":"48_CR20","unstructured":"NIST. Specification for the Advanced Encryption Standard (AES). FIPS 197 (November 2001)"},{"issue":"177","key":"48_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"48_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"48_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1102199.1102205","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005","author":"G. Karjoth","year":"2005","unstructured":"Karjoth, G., Moskowitz, P.A.: Disabling RFID Tags with Visible Confirmation: Clipped Tags are Silenced. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 27\u201330. ACM, New York (2005)"}],"container-title":["Communications in Computer and Information Science","Constructing Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31479-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:06:27Z","timestamp":1557187587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31479-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314780","9783642314797"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31479-7_48","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}