{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T01:10:01Z","timestamp":1745197801515,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_7","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"86-99","source":"Crossref","is-referenced-by-count":0,"title":["Background Transfer Method for Ubiquitous Computing"],"prefix":"10.1007","author":[{"given":"Tae-Gyu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Gi-Soo","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"McCann, J., Bryson, D.: Smart clothes and wearable technology, pp. 3\u201324, 205\u2013213. CRC Press (2009)","DOI":"10.1533\/9781845695668"},{"key":"7_CR2","unstructured":"Krumm, J.: Ubiquitous Computing Fundamentals, pp. 1\u201335. CRC Press (2010)"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y. Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F.: A survey of key management schemes in wireless sensor networks. Computer Communications\u00a030, 2314\u20132341 (2007)","journal-title":"Computer Communications"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Al-bar, A., Wakeman, I.: A Survey of Adaptive Applications in Mobile Computing. In: The 21st International Conference on Distributed Computing Systems Workshops (ICDCSW 2001), p. 246 (2001)","DOI":"10.1109\/CDCS.2001.918713"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.5121\/ijnsa.2010.2206","volume":"2","author":"K.S. Ramana","year":"2010","unstructured":"Ramana, K.S., Chari, A.A., Kasiviswanth, N.: A Survey on Trust Management for Mobile Ad Hoc Networks. International Journal of Network Security & Its Applications (IJNSA)\u00a02(2), 75\u201385 (2010)","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Goth, G.: Mobile Devices Present Integration Challenges. In: IEEE IT Pro., pp. 11\u201315 (May 1999)","DOI":"10.1109\/6294.774947"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Poslad, S.: Ubiquitous Computing-smart devices, environments and interactions, pp. 343\u2013378. John Wiley & Sons (2009)","DOI":"10.1002\/9780470779446"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Xu, Y., Li, W.J., Lee, K.K.: Intelligent Wearable Interfaces, pp. 5\u201330. John Wiley & Sons Press (2008)","DOI":"10.1002\/9780470222867"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/30.883428","volume":"46","author":"P.P. Dang","year":"2000","unstructured":"Dang, P.P., Chau, P.M.: Robust image transmission over CDMA channels. IEEE Transactions on Consumer Electronics\u00a046(3), 664\u2013672 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7_CR10","unstructured":"Chu, G.H.: Image transmission apparatus and method using CDMA communication network, U.S. Patent No. US007505782B2, March 17 (2009)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Siewiorek, D., Smailagic, A., Starner, T.: Application Design for Wearable Computing, pp. 51\u201358. Morgan & Claypool Publishers (2008)","DOI":"10.1007\/978-3-031-02476-4_3"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Lo, A., Lu, W., Jacobsson, M., Prasad, V., Niemegeers, I.: Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (July 2006)","DOI":"10.1109\/MOBIQ.2006.340446"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/65.690946","volume":"12","author":"H. Frazier","year":"1998","unstructured":"Frazier, H.: The 802.3z Gigabit Ethernet Standard. IEEE Network\u00a012(3), 6\u20137 (1998)","journal-title":"IEEE Network"},{"key":"7_CR14","unstructured":"Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA\/CD) access method and Physical Layer specifications,\" IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Std. 802.3 (2008)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:42:16Z","timestamp":1745196136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}