{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:28:07Z","timestamp":1742948887937,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642406744"},{"type":"electronic","value":"9783642406751"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-40675-1_77","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T12:12:46Z","timestamp":1376914366000},"page":"515-520","source":"Crossref","is-referenced-by-count":0,"title":["Development of STEAM Education Program Centering on Non-traditional Energy"],"prefix":"10.1007","author":[{"given":"Yilip","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jeongyeun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Namje","family":"Park","sequence":"additional","affiliation":[]},{"given":"Hyungkyu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"77_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-35606-3_38","volume-title":"Network and Parallel Computing","author":"N. Park","year":"2012","unstructured":"Park, N., Ko, Y.: Computer Education\u2019s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education. In: Park, J.J., Zomaya, A., Yeo, S.-S., Sahni, S. (eds.) NPC 2012. LNCS, vol.\u00a07513, pp. 320\u2013327. Springer, Heidelberg (2012)"},{"key":"77_CR2","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-35264-5_15","volume-title":"Computer Applications for Security, Control and System Engineering","author":"Y. Ko","year":"2012","unstructured":"Ko, Y., An, J., Park, N.: Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol.\u00a0339, pp. 109\u2013114. Springer, Heidelberg (2012)"},{"key":"77_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-27142-7_30","volume-title":"Future Generation Information Technology","author":"Y. Ko","year":"2011","unstructured":"Ko, Y., Park, N.: Experiment and Verification of Teaching Fractal Geometry Concepts Using a Logo-Based Framework for Elementary School Children. In: Kim, T.-H., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K.-I., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol.\u00a07105, pp. 257\u2013267. Springer, Heidelberg (2011)"},{"key":"77_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/11610496_100","volume-title":"Advanced Web and Network Technologies, and Applications","author":"N. Park","year":"2006","unstructured":"Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 741\u2013748. Springer, Heidelberg (2006)"},{"key":"77_CR5","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-16339-5_10","volume-title":"Information Computing and Applications","author":"N. Park","year":"2010","unstructured":"Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol.\u00a0106, pp. 72\u201379. Springer, Heidelberg (2010)"},{"key":"77_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-642-23935-9_48","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2011","unstructured":"Park, N.: Secure UHF\/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 488\u2013496. Springer, Heidelberg (2011)"},{"issue":"4","key":"77_CR7","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJAHUC.2011.043583","volume":"8","author":"N. Park","year":"2011","unstructured":"Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing\u00a08(4), 205\u2013219 (2011)","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"77_CR8","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-16732-4_21","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol.\u00a06422, pp. 193\u2013202. Springer, Heidelberg (2010)"},{"key":"77_CR9","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-16732-4_16","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol.\u00a06422, pp. 142\u2013152. Springer, Heidelberg (2010)"},{"key":"77_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-642-24106-2_60","volume-title":"Convergence and Hybrid Information Technology","author":"N. Park","year":"2011","unstructured":"Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., \u015al\u0119zak, D. (eds.) ICHIT 2011. CCIS, vol.\u00a0206, pp. 467\u2013474. Springer, Heidelberg (2011)"},{"key":"77_CR11","series-title":"SCI","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-23418-7_28","volume-title":"Semantic Methods for Knowledge Management and Communication","author":"N. Park","year":"2011","unstructured":"Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol.\u00a0381, pp. 319\u2013327. Springer, Heidelberg (2011)"},{"key":"77_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-14654-1_30","volume-title":"Wireless Algorithms, Systems, and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol.\u00a06221, pp. 245\u2013252. Springer, Heidelberg (2010)"},{"issue":"5","key":"77_CR13","first-page":"785","volume":"35","author":"N. Park","year":"2010","unstructured":"Park, N.: The Implementation of Open Embedded S\/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society\u00a035(5), 785\u2013793 (2010)","journal-title":"The Journal of Korea Information and Communications Society"},{"key":"77_CR14","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/978-94-007-5699-1_71","volume-title":"Computer Science and its Applications","author":"N. Park","year":"2012","unstructured":"Park, N., Cho, S., Kim, B.-D., Lee, B., Won, D.: Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, S.-S., Pan, Y., Lee, Y.S., Chang, H.B. (eds.) Computer Science and its Applications. LNEE, vol.\u00a0203, pp. 699\u2013705. Springer, Heidelberg (2012)"},{"key":"77_CR15","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/978-94-007-5699-1_71","volume-title":"Computer Science and its Applications","author":"N. Park","year":"2012","unstructured":"Park, N., Cho, S., Kim, B.-D., Lee, B., Won, D.: Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, S.-S., Pan, Y., Lee, Y.S., Chang, H.B. (eds.) Computer Science and its Applications. LNEE, vol.\u00a0203, pp. 699\u2013705. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Electrical Engineering","Mobile, Ubiquitous, and Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40675-1_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:02:16Z","timestamp":1674500536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-40675-1_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642406744","9783642406751"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40675-1_77","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2014]]}}}