{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:27:19Z","timestamp":1743150439159,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":17,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400750821"},{"type":"electronic","value":"9789400750838"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-94-007-5083-8_33","type":"book-chapter","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T06:31:00Z","timestamp":1345098660000},"page":"265-271","source":"Crossref","is-referenced-by-count":5,"title":["Mobile RFID\/NFC Linkage Based on UHF\/HF Dual Band\u2019s Integration in U-Sensor Network Era"],"prefix":"10.1007","author":[{"given":"Namje","family":"Park","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/11610496_100","volume-title":"Advanced Web and Network Technologies, and Applications","author":"N. Park","year":"2006","unstructured":"Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 741\u2013748. Springer, Heidelberg (2006)"},{"key":"33_CR2","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-16339-5_10","volume-title":"Information Computing and Applications","author":"N. Park","year":"2010","unstructured":"Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol.\u00a0106, pp. 72\u201379. Springer, Heidelberg (2010)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-642-23935-9_48","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2011","unstructured":"Park, N.: Secure UHF\/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 488\u2013496. Springer, Heidelberg (2011)"},{"issue":"4","key":"33_CR4","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJAHUC.2011.043583","volume":"8","author":"N. Park","year":"2011","unstructured":"Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing\u00a08(4), 205\u2013219 (2011)","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"33_CR5","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-16732-4_21","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol.\u00a06422, pp. 193\u2013202. Springer, Heidelberg (2010)"},{"key":"33_CR6","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-16732-4_16","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol.\u00a06422, pp. 142\u2013152. Springer, Heidelberg (2010)"},{"key":"33_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-642-24106-2_60","volume-title":"Convergence and Hybrid Information Technology","author":"N. Park","year":"2011","unstructured":"Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., \u015al\u0119zak, D. (eds.) ICHIT 2011. CCIS, vol.\u00a0206, pp. 467\u2013474. Springer, Heidelberg (2011)"},{"key":"33_CR8","series-title":"SCI","first-page":"319","volume-title":"Semantic Methods","author":"N. Park","year":"2011","unstructured":"Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol.\u00a0381, pp. 319\u2013327. Springer, Heidelberg (2011)"},{"key":"33_CR9","unstructured":"Kim, Y.: Harmful-word Dictionary DB based Text Classification for Improving Performances of Precesion and Recall. Sungkyunkwan University, Ph.D. Thesis (2009)"},{"key":"33_CR10","series-title":"SCI","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-21375-5_17","volume-title":"Computers, Networks, Systems, and Industrial Engineering 2011","author":"Y. Kim","year":"2011","unstructured":"Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers, Networks, Systems, and Industrial Engineering 2011. SCI, vol.\u00a0365, pp. 201\u2013208. Springer, Heidelberg (2011)"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISCE.2007.4382123","volume-title":"Proc. of IEEE International Symposium on Consumer Electronics","author":"Y. Kim","year":"2007","unstructured":"Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments. In: Proc. of IEEE International Symposium on Consumer Electronics, pp. 1\u20134. IEEE, Los Alamitos (2007)"},{"issue":"1","key":"33_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.5392\/JKCA.2009.9.1.131","volume":"9","author":"Y. Kim","year":"2009","unstructured":"Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association\u00a09(1), 131\u2013138 (2009)","journal-title":"Journal of Korea Contents Association"},{"issue":"2","key":"33_CR13","doi-asserted-by":"publisher","first-page":"216","DOI":"10.4218\/etrij.06.0205.0082","volume":"28","author":"W. Choi","year":"2006","unstructured":"Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal\u00a028(2), 216\u2013218 (2006)","journal-title":"ETRI Journal"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Needham, R.M., Schroeder, M.D.: Authentication Revisited. Operating System Review 21(1) (1987)","DOI":"10.1145\/24592.24593"},{"key":"33_CR15","unstructured":"MRF Forum: Application Data Format for Mobile RFID Services. MRFS-3-02 (2005)"},{"key":"33_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-14654-1_30","volume-title":"Wireless Algorithms, Systems, and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol.\u00a06221, pp. 245\u2013252. Springer, Heidelberg (2010)"},{"issue":"5","key":"33_CR17","first-page":"785","volume":"35","author":"N. Park","year":"2010","unstructured":"Park, N.: The Implementation of Open Embedded S\/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society\u00a035(5), 785\u2013793 (2010)","journal-title":"The Journal of Korea Information and Communications Society"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence, Secure and Trust Computing, and Data Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5083-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T09:39:20Z","timestamp":1675762760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5083-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9789400750821","9789400750838"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5083-8_33","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2012]]}}}