{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:08:41Z","timestamp":1743149321833,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":14,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_18","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"289-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Architecture Is Politics: Security and Privacy Issues in Transport and Beyond"],"prefix":"10.1007","author":[{"given":"Bart","family":"Jacobs","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Brands, S. 2000. Rethinking public key infrastructures and digital certificates: Building in privacy. Cambridge: MIT Press. Also available online at www.credentica.com.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"issue":"5906","key":"18_CR2","first-page":"1322","volume":"322","author":"A. Cho","year":"2008","unstructured":"Cho, A. 2008. University hackers test the right to expose security concerns. Nature 322 (5906): 1322\u20131323. Also available online at http:\/\/www.sciencemag.org\/cgi\/reprint\/322\/5906\/1322.pdf.","journal-title":"Nature"},{"key":"18_CR3","unstructured":"European Commission. 2009. Commission recommendation on the implementation of privacy and data protection principles in applications supported by radio-frequency identification. 12 may 2009. C(2009)3200 final."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-88313-5_7","volume-title":"Computer security\u2014ESORICS 2008","author":"F. Garcia","year":"2008","unstructured":"Garcia, F., G. de Koning Gans, R. Muijrers, P. van Rossum, R. Verdult, R. Wichers Schreur, and B. Jacobs. 2008. Dismantling MIFARE classic. In Computer security\u2014ESORICS 2008, eds. S. Jajodia and J. Lopez, 97\u2013114. Lecture Notes Computer Science, vol. 5283. Berlin: Springer."},{"key":"18_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2009.6","volume-title":"Wirelessly pickpocketing a mifare classic card. In 30th IEEE symposium on security and privacy (S&P 2009)","author":"F. Garcia","year":"2009","unstructured":"Garcia, F., P. van Rossum, R. Verdult, and R. Wichers Schreur. 2009 Wirelessly pickpocketing a mifare classic card. In 30th IEEE symposium on security and privacy (S&P 2009), 3\u201315. Oakland: IEEE."},{"issue":"4","key":"18_CR6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.37974\/ALF.83","volume":"1","author":"B. Jacobs","year":"2009","unstructured":"Jacobs, B. 2009. Keeping our surveillance society non-totalitarian. Amsterdam Law Forum 1 (4): 19\u201334. Also available online at http:\/\/ojs.ubvu.vu.nl\/alf\/article\/view\/91\/156.","journal-title":"Amsterdam Law Forum"},{"issue":"3","key":"18_CR7","first-page":"84","volume":"4","author":"B. Jacobs","year":"2009","unstructured":"Jacobs, B., and W. de Jonge. 2009. Safety in numbers: Road pricing beyond \u2018thin\u2019 and \u2018fat\u2019. Thinking Highways 4 (3): 84\u201387 (Sept.\/Oct. 2009).","journal-title":"Thinking Highways"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"de Jonge de, and B. Jacobs. 2009. Privacy-friendly electronic traffic pricing via commits. In Formal aspects in security and trust, eds. P. Degano, J. Guttman, and F. Martinelli, 143\u2013161. Lecture Notes Computer Science, vol. 5491. Berlin: Springer.","DOI":"10.1007\/978-3-642-01465-9_10"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-540-85893-5_20","volume-title":"8th smart card research and advanced application conference (CARDIS 2008)","author":"G. de Koning Gans","year":"2008","unstructured":"de Koning Gans, G., J.-H. Hoepman, and F. Garcia. 2008. A practical attack on the MIFARE classic. In 8th smart card research and advanced application conference (CARDIS 2008), eds. G. Grimaud and F.-X. Standaert, 267\u2013282. Lecture Notes Computer Science, vol. 5189. Berlin: Springer."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Le M\u00e9tayer, D. 2010. Privacy by design: A matter of choice. This volume.","DOI":"10.1007\/978-90-481-8865-9_20"},{"key":"18_CR11","unstructured":"Lessig L. 2001. The future of ideas. Vintage. Knopf Doubleday Publishing."},{"key":"18_CR12","unstructured":"Nohl, K., D. Evans, Starbug, and H. Pl\u00f6tz. 2008. Reverse-engineering a cryptographic RFID tag. In 17th USENIX security symposium, 185\u201394. San Jose, CA. USENIX Association, see http:\/\/www.informatik.uni-trier.de\/~ley\/db\/conf\/uss\/index.html"},{"key":"18_CR13","unstructured":"Nohl, K., and H. Pl\u00f6tz. 2007. Mifare, little security, despite obscurity, Dec. 2007. Presentation on the 24th Congress of the Chaos Computer Club. Berlin. see http:\/\/events.ccc.de\/congress\/2007."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45682-1_31","volume-title":"Advances in cryptology\u2014ASIACRYPT 2001","author":"E. Verheul","year":"2001","unstructured":"Verheul, E. 2001. Self-blindable credential certificates from the Weil pairing. In Advances in cryptology\u2014ASIACRYPT 2001, ed. C. Boyd, 533\u2013550. Lecture Notes Computer Science, vol. 2248. Berlin: Springer."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:49:18Z","timestamp":1720694958000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_18","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}