{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:36:50Z","timestamp":1742956610199,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":20,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789401787970"},{"type":"electronic","value":"9789401787987"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-017-8798-7_65","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T05:40:19Z","timestamp":1397799619000},"page":"545-551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System"],"prefix":"10.1007","author":[{"given":"Namje","family":"Park","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,19]]},"reference":[{"unstructured":"Laxhammar E, Falkman G, Sviestins E (2009) Anomaly detection in sea treffic\u2014a comparison of the gaussian mixture model and the kernel density estimator. In: ISIF 2009","key":"65_CR1"},{"issue":"3","key":"65_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1049\/iet-its.2008.0080","volume":"3","author":"A Kawaguchi","year":"2009","unstructured":"Kawaguchi A et al (2009) Towards the development of intelligent navigation support systems gor group shipping and global marine traffic control. IET Intell Transp Syst 3(3):257\u2013267","journal-title":"IET Intell Transp Syst"},{"issue":"7","key":"65_CR3","first-page":"1073","volume":"35","author":"BG Lee","year":"2010","unstructured":"Lee BG, Han JW, Jo HS (2010) Design of situation awareness and aids to navigation structure of VTS for maritime safety. J Korea Inf Commun Soc 35(7):1073\u20131080","journal-title":"J Korea Inf Commun Soc"},{"doi-asserted-by":"crossref","unstructured":"Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb workshops 2006. LNCS, vol 3842. Springer, Heidelberg, pp 741\u2013748","key":"65_CR4","DOI":"10.1007\/11610496_100"},{"key":"65_CR5","series-title":"CCIS","first-page":"72","volume-title":"ICICA 2010","author":"N Park","year":"2010","unstructured":"Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B, Liu C (eds) ICICA 2010, vol 106., CCISSpringer, Heidelberg, pp 72\u201379"},{"key":"65_CR6","series-title":"LNCS","first-page":"488","volume-title":"ICCCI 2011","author":"N Park","year":"2011","unstructured":"Park N (2011) Secure UHF\/HF dual-band RFID: strategic framework approaches and application solutions. ICCCI 2011., LNCSSpringer, Heidelberg, pp 488\u2013496"},{"issue":"4","key":"65_CR7","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJAHUC.2011.043583","volume":"8","author":"N Park","year":"2011","unstructured":"Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205\u2013219","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"key":"65_CR8","series-title":"LNCS(LNAI)","first-page":"193","volume-title":"ICCCI 2010","author":"N Park","year":"2010","unstructured":"Park N, Kim Y (2010) Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 193\u2013202"},{"key":"65_CR9","series-title":"LNCS(LNAI)","first-page":"142","volume-title":"ICCCI 2010","author":"N Park","year":"2010","unstructured":"Park N, Song Y (2010) AONT encryption based application data management in mobile RFID environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 142\u2013152"},{"key":"65_CR10","first-page":"467","volume-title":"Communications in computer and information science","author":"N Park","year":"2011","unstructured":"Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: Lee G, Howard D, \u015al\u0119zak D (eds) Communications in computer and information science, vol 206. Springer, Heidelberg, pp 467\u2013474"},{"key":"65_CR11","first-page":"319","volume-title":"Studies in computational intelligence","author":"N Park","year":"2011","unstructured":"Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R et al (eds) Studies in computational intelligence, vol 381. Springer, Heidelberg, pp 319\u2013327"},{"key":"65_CR12","first-page":"245","volume-title":"WASA 2010. LNCS","author":"N Park","year":"2010","unstructured":"Park N, Song Y (2010) Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan G, Anil Kumar VS, Ming G, Liu Y, Li Y (eds) WASA 2010. LNCS, vol 6221. Springer, Heidelberg, pp 245\u2013252"},{"issue":"5","key":"65_CR13","first-page":"785","volume":"35","author":"N Park","year":"2010","unstructured":"Park N (2010) The implementation of open embedded S\/W platform for secure mobile RFID reader. J Korea Inf Commun Soc 35(5):785\u2013793","journal-title":"J Korea Inf Commun Soc"},{"key":"65_CR14","first-page":"320","volume-title":"NPC 2012","author":"N Park","year":"2012","unstructured":"Park N, Ko Y (2012) Computer education\u2018s teaching-learning methods using educational programming language based on STEAM education. In: Park J, Zomaya A, Yeo S et al (eds) NPC 2012, vol 7513. Springer, Heidelberg, pp 320\u2013327"},{"key":"65_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-35264-5_15","volume-title":"Computer applications for security, control and system engineering","author":"Y Ko","year":"2012","unstructured":"Ko Y, An J, Park N (2012) Development of computer, math, art convergence education lesson plans based on smart grid technology. In: Kim T, Stoica A, Fang W et al (eds) Computer applications for security, control and system engineering, vol 339. Springer, Heidelberg, pp 109\u2013114"},{"key":"65_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-27142-7_30","volume-title":"Future generation information technology","author":"Y Ko","year":"2011","unstructured":"Ko Y, Park N (2011) Experiment and verification of teaching fractal geometry concepts using a logo-based framework for elementary school children. In: Kim T, Adeli H, Slezak D et al (eds) Future generation information technology, vol 7105. Springer, Heidelberg, pp 257\u2013267"},{"key":"65_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-94-007-5076-0_28","volume-title":"Embedded and multimedia computing technology and service","author":"J An","year":"2012","unstructured":"An J, Park N (2012) The effect of EPL programming based on CPS model for enhancing elementary school students\u2019creativity. In: Park JJH, Jeong Y, Park SO et al (eds) Embedded and multimedia computing technology and service, vol 181. Springer, The Netherlands, pp 237\u2013244"},{"key":"65_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-94-007-2598-0_26","volume-title":"IT convergence and services","author":"J An","year":"2011","unstructured":"An J, Park N (2011) Computer application in elementary education bases on fractal geometry theory using LOGO programming. In: Park JJ, Arabnia H, Chang H et al (eds) IT convergence and services, vol 107. Springer, The Netherlands, pp 241\u2013249"},{"key":"65_CR19","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/978-94-007-5699-1_70","volume-title":"Computer science and its applications","author":"Y Kim","year":"2012","unstructured":"Kim Y, Park N (2012) Development and application of STEAM teaching model based on the rube goldberg\u2018s invention. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 693\u2013698"},{"key":"65_CR20","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/978-94-007-5699-1_71","volume-title":"Computer science and its applications","author":"N Park","year":"2012","unstructured":"Park N, Cho S, Kim B et al (2012) Security enhancement of user authentication scheme using IVEF in vessel traffic service system. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 699\u2013705"}],"container-title":["Lecture Notes in Electrical Engineering","Frontier and Innovation in Future Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-017-8798-7_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T07:03:08Z","timestamp":1674543788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-017-8798-7_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9789401787970","9789401787987"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-94-017-8798-7_65","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}