{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:58:11Z","timestamp":1773381491192,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10796-009-9210-z","type":"journal-article","created":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T08:58:15Z","timestamp":1248771495000},"page":"491-505","source":"Crossref","is-referenced-by-count":177,"title":["Classifying RFID attacks and defenses"],"prefix":"10.1007","volume":"12","author":[{"given":"Aikaterini","family":"Mitrokotsa","sequence":"first","affiliation":[]},{"given":"Melanie R.","family":"Rieback","sequence":"additional","affiliation":[]},{"given":"Andrew S.","family":"Tanenbaum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,29]]},"reference":[{"key":"9210_CR1","unstructured":"22C3 (2007). RFID Zapper. https:\/\/events.ccc.de\/congress\/2005\/static\/r\/f\/i\/RFID-Zapper(EN)_77f3.html . Accessed July 2009."},{"key":"9210_CR2","series-title":"Lecture notes in computer science, security and cryptology","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/11507840_14","volume-title":"Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica","author":"G Avoine","year":"2005","unstructured":"Avoine, G., & Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. S. Patrick & M. Yung (Eds.), Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica. Lecture notes in computer science, security and cryptology (Vol. 3570, pp. 125\u2013140). Berlin, Heidelberg: Springer-Verlag. doi: 10.1007\/b137875 ."},{"key":"9210_CR3","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.clsr.2007.09.005","volume":"23","author":"J Ayoade","year":"2007","unstructured":"Ayoade, J. (2007). Privacy and RFID systems, roadmap for solving security and privacy concerns in RFID systems. Computer Law & Security Report, 23, 555\u2013561.","journal-title":"Computer Law & Security Report"},{"key":"9210_CR4","unstructured":"Center for Democracy & Technology (2006). CDT working group on RFID: Privacy best practices for deployement of RFID technology. Interim Draft. http:\/\/www.cdt.org\/privacy\/20060501rfid-best-practices.php . Accessed July 2009."},{"key":"9210_CR5","unstructured":"Desmedt, Y. (2006). Major security problems with the \u201cunforgeable\u201d (Feige-)Fiat-Shamir proofs for identity and how to overcome them. In Proceedings of the 6th worldwide congress on computer and communications security and protection (Securicomm\u201988), March 1988 (pp. 141\u2013159). Paris, France."},{"key":"9210_CR6","first-page":"58","volume-title":"Proceedings of the 2008 IEEE international conference on RFID, 16\u201317 April 2008","author":"S Devadas","year":"2008","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., & Khandelwal, V. (2008). Design and implementation of PUF-based \u201cunclonable\u201d RFID ICs for anti-counterfeiting and security applications. In Proceedings of the 2008 IEEE international conference on RFID, 16\u201317 April 2008 (pp. 58\u201364). Las Vegas: IEEE Computer Society."},{"key":"9210_CR7","first-page":"59","volume-title":"Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905)","author":"T Dimitriou","year":"2005","unstructured":"Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905) (pp. 59\u201366). Las Vegas: IEEE Computer Society."},{"key":"9210_CR8","unstructured":"Emvelope (2005). Products. http:\/\/www.emvelope.com\/products . Accessed July 2009."},{"key":"9210_CR9","unstructured":"EPCGlobal (2005). Guidelines on EPC for consumer products. http:\/\/www.epcglobalinc.org\/public\/ppsc_guide\/ . Accessed July 2009."},{"key":"9210_CR10","unstructured":"EPCGlobal Inc. (2005). EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz. Specification for RFID air interface. (Vol. 1.2.0). http:\/\/www.epcglobalinc.org\/standards\/uhfc1g2\/uhfc1g2_1_2_0-standard-20080511.pdf . Accessed July 2009."},{"key":"9210_CR11","unstructured":"European Commission (1995). Directive 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free Movement of such data. Official Journal of European Communities, (L.281), 31."},{"key":"9210_CR12","unstructured":"European Digital Rights (EDRI-gram) (2006). Cloning an electronic passport. EDRI-gram, digital civil rights in Europe. No. 4\u201316. http:\/\/www.edri.org\/edrigram\/number4.16\/epassport\/ . Accessed July 2009."},{"key":"9210_CR13","unstructured":"Federal Office for Information Security (2004). Security aspects and prospective applications of RFID systems. RFID consultation website. http:\/\/www.rfidconsultation.eu\/docs\/ficheiros\/RIKCHA_englisch_Layout.pdf . Accessed July 2009."},{"key":"9210_CR14","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic hardware and embedded systems - CHES 2004. Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES\u201904)","author":"M Fedhofer","year":"2004","unstructured":"Fedhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In M. Joye & J.-J. Quisquater (Eds.), Cryptographic hardware and embedded systems - CHES 2004. Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES\u201904). Lecture notes in computer science (Vol. 3156, pp. 357\u2013370). Berlin: Springer. doi: 10.1007\/b99451 ."},{"key":"9210_CR15","series-title":"Lecture notes in computer science, computer communication networks and telecommunications","first-page":"42","volume-title":"Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS \u201904)","author":"K Fishkin","year":"2004","unstructured":"Fishkin, K., Roy, S., & Jiang, B. (2004). Some methods for privacy in RFID communication. In C. Castellucia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS \u201904). Lecture notes in computer science, computer communication networks and telecommunications (Vol. 3313, pp. 42\u201353). Berlin: Springer. doi: 10.1007\/b105219 ."},{"key":"9210_CR16","series-title":"Lecture notes in computer science","first-page":"214","volume-title":"Ubiquitous computing systems, second international symposium (UCS \u201904), Tokyo, Japan","author":"C Floerkemeier","year":"2004","unstructured":"Floerkemeier, C., Schneider, R., & Langheinrich, M. (2004). Scanning with a purpose\u2014supporting the fair information principles in RFID protocols. In H. Murakami, H. Nakashima, H. Tokuda, & M. Yasumura (Eds.), Ubiquitous computing systems, second international symposium (UCS \u201904), Tokyo, Japan. Lecture notes in computer science (Vol.3598, pp. 214\u2013231). Berlin: Springer. doi: 10.1007\/11526858 ."},{"key":"9210_CR17","unstructured":"Friedl, S. (2007). SQL Injection attacks by example. http:\/\/unixwiz.net\/techtips\/sql-injection.html . Accessed July 2009."},{"key":"9210_CR18","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-88313-5_7","volume-title":"Proceedings of the 13th European symposium on research in computer security, Malaga, Spain","author":"FD Garcia","year":"2008","unstructured":"Garcia, F. D., de Koning Gans, G., Muijrers, R., van Rossum P., Verdult, R., Wichers Schreur, R., et al. (2008). Dismantling MIFARE classic. In Proceedings of the 13th European symposium on research in computer security, Malaga, Spain. Lecture notes in computer science (Vol. 5283, pp. 97\u2013114). Berlin: Springer."},{"issue":"3","key":"9210_CR19","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S Garfinkel","year":"2005","unstructured":"Garfinkel, S., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3), 34\u201343.","journal-title":"IEEE Security & Privacy"},{"issue":"6","key":"9210_CR20","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1197\/jamia.M2143","volume":"13","author":"J Halamka","year":"2006","unstructured":"Halamka, J., Juels, A., Stubblefield, A., & Westhues, J. (2006). The security implications of VeriChip cloning. Journal of American Medical Informatics Association, 13(6), 601\u2013607.","journal-title":"Journal of American Medical Informatics Association"},{"key":"9210_CR21","first-page":"67","volume-title":"Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905)","author":"G Hancke","year":"2005","unstructured":"Hancke, G., & Kuhn, M. (2005). An RFID distance bounding protocol. In Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905) (pp. 67\u201373). Las Vegas: IEEE Computer Society."},{"key":"9210_CR22","unstructured":"Information Technology Laboratory, National Institute of Standards and Technology (2001). Security requirements for cryptographic modules. Federal information processing standards publication. FIPS PUB 140\u20132. 25 May 2001. http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf . Accessed July 2009."},{"key":"9210_CR23","volume-title":"Proceedings of RFID privacy workshop","author":"S Inoue","year":"2003","unstructured":"Inoue, S., & Yasuura, H. (2003). RFID Privacy using user-controllable uniqueness. In Proceedings of RFID privacy workshop. MA, USA: MIT."},{"key":"9210_CR24","unstructured":"International Civil Aviation Organization (2002). ICAO document 9303 - Part 1 machine readable passport (Vol. 2). http:\/\/www2.icao.int\/en\/MRTD\/Pages\/Doc9393.aspx . Accessed July 2009."},{"key":"9210_CR25","unstructured":"International Organization for Standardization (2009). ISO\/IEC 9798: Information technology\u2014security techniques\u2014entity authentication, Part 1(1997), Part 2 (2008), Part 3 (1998), Part 4 (1999), Part 5 (2004). www.iso.org . Accessed July 2009."},{"key":"9210_CR26","series-title":"Lecture notes in computer science, security and cryptology","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/b98935","volume-title":"Security in communication networks, proceedings of the 4th international conference on security in communication networks (SCN\u201904), Amalfi, Italy, 8\u201310 September 2004","author":"A Juels","year":"2004","unstructured":"Juels, A. (2004). Minimalist cryptography for low-cost RFID tags. In C. Blundo & S. Cimato (Eds.), Security in communication networks, proceedings of the 4th international conference on security in communication networks (SCN\u201904), Amalfi, Italy, 8\u201310 September 2004. Lecture notes in computer science, security and cryptology (Vol. 3352, pp. 149\u2013164). Berlin: Springer. doi: 10.1007\/b105083 ."},{"key":"9210_CR27","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/1080793.1080805","volume-title":"Proceedings of ACM workshop on wireless security (WiSec\u201905)","author":"A Juels","year":"2005","unstructured":"Juels, A. (2005). Stengthening EPC tags against cloning. In M. Jakobsson & R. Povendran (Eds.), Proceedings of ACM workshop on wireless security (WiSec\u201905) (pp. 67\u201376). New York: ACM."},{"key":"9210_CR28","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"Proceedings of the 8th ACM conference on computer and communication security, Washington, DC, USA","author":"A Juels","year":"2003","unstructured":"Juels, A., Rivest, R., & Szydlo, M. (2003). The Blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Alturi (Ed.), Proceedings of the 8th ACM conference on computer and communication security, Washington, DC, USA (pp. 103\u2013111). New York: ACM."},{"key":"9210_CR29","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1102199.1102205","volume-title":"Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES \u201905)","author":"G Karjoth","year":"2005","unstructured":"Karjoth, G., & Moskowitz, P. A. (2005). Disabling RFID tags with visible confirmation: Clipped tags are silenced. In V. Atluri, S.D.C. di Vimercanti, & R. Dingledine (Eds.), Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES \u201905) (pp. 27\u201330). Alexandria: ACM."},{"key":"9210_CR30","first-page":"1","volume-title":"Proceedings of the 1st international conference on communications and networking in China (ChinaCom\u201906)","author":"A Karygiannis","year":"2006","unstructured":"Karygiannis, A., Phillips, T., & Tsibertzopoulos, A. (2006). RFID security: A taxonomy of risk. In Proceedings of the 1st international conference on communications and networking in China (ChinaCom\u201906) (pp. 1\u20137). Beijing: IEEE."},{"key":"9210_CR31","unstructured":"Karygiannis, T., Eydt, B., Barber, G., Bunn, L., & Phillips, T. (2007). Guidelines for securing radio frequency identification (RFID) systems: Recommendations of the national institute of standards and technology. NIST Special publication 800\u201398, national institute of standards and technology, technology administration U.S. Department of Commerce."},{"key":"9210_CR32","unstructured":"Kent, J. (2005). Malaysia car thieves steal finger. BBC\u00a0News, 31 March 2005. http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/4396831.stm . Accessed July 2009."},{"key":"9210_CR33","first-page":"47","volume-title":"Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905)","author":"Z Kfir","year":"2005","unstructured":"Kfir, Z., & Wool, A. (2005). Picking virtual pockets using relay attacks on contactless smart card. Proceedings of the 1st international conference on security and privacy for emerging areas in communication networks (SecureComm\u201905) (pp. 47\u201348). Silver Spring: IEEE Computer Society Press."},{"issue":"8","key":"9210_CR34","first-page":"2007","volume":"45","author":"S Kinoshita","year":"2004","unstructured":"Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., & Ohkubo, M. (2004). Low-cost RFID privacy protection scheme. Transactions of information processing society of Japan, 45(8), 2007\u20132021.","journal-title":"Transactions of information processing society of Japan"},{"key":"9210_CR35","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/S1353-4858(07)70080-6","volume":"9","author":"A Laurie","year":"2007","unstructured":"Laurie, A. (2007). Practical attacks against RFID. Network Security, 9, 4\u20137.","journal-title":"Network Security"},{"key":"9210_CR37","unstructured":"MobileCloak (2009) The off switch for \u201calways on\u201d mobile wireless devices, spychips, toll tags, RFID tags and technologies. http:\/\/www.mobilecloak.com . Accessed July 2009."},{"issue":"7","key":"9210_CR38","first-page":"89","volume":"7","author":"L Mirowski","year":"2007","unstructured":"Mirowski, L., & Hartnett, J. (2007). Deckard: A system to detect change of RFID tag ownership. International Journal of Computer Science and Network Security, 7(7), 89\u201398.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"9210_CR39","unstructured":"MIT Auto-ID Center (2003) Draft protocol specification for a 900 MHz class 0 radio frequency identification tag. http:\/\/epcglobalinc.org\/standards\/specs\/900_MHz_Class_0_RFIDTag_Specification.pdf . Accessed July 2009."},{"key":"9210_CR40","first-page":"210","volume-title":"Proceedings of the 11th conference on computer and communications security (ACM CCS \u201904), Washington DC USA","author":"D Molnar","year":"2004","unstructured":"Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices and architectures. In Proceedings of the 11th conference on computer and communications security (ACM CCS \u201904), Washington DC USA (pp. 210\u2013219). New York: ACM."},{"key":"9210_CR41","volume-title":"Proceedings of RFID Privacy Workshop","author":"M Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to \u201cprivacy-friendly\u201d tags. In Proceedings of RFID Privacy Workshop. Cambridge: MIT."},{"key":"9210_CR42","series-title":"Lecture notes in computer science, information systems and applications, incl. Internet\/Web, and HCI","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/11807964_39","volume-title":"Emerging directions in embedded and ubiquitous computing, proceedings of EUC 2006 workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1\u20134 , 2006","author":"CH Quan","year":"2006","unstructured":"Quan, C. H., Hong, W. K., & Kim, H. C. (2006). Performance analysis of tag anti-collision algorithms for RFID systems. In Emerging directions in embedded and ubiquitous computing, proceedings of EUC 2006 workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1\u20134 , 2006. Lecture notes in computer science, information systems and applications, incl. Internet\/Web, and HCI (Vol. 4097, pp. 382\u2013391). Berlin: Springer. doi: 10.1007\/11807964 ."},{"key":"9210_CR43","unstructured":"Raboud University Nijmegen (2008). Dismantling contactless smart cards. 08-33A. Press Release. http:\/\/www2.ru.nl\/media\/pressrelease.pdf . Accessed July 2009."},{"key":"9210_CR44","first-page":"204","volume-title":"Proceedings of the 2nd ASIAN symposium on information, computer and communications security, Singapore","author":"J Reid","year":"2007","unstructured":"Reid, J., Gonzalez Nieto, J. M., Tang, T., & Senadji, B. (2007). Detecting relay attacks with timing-based protocols. In Proceedings of the 2nd ASIAN symposium on information, computer and communications security, Singapore (pp. 204\u2013213). New York: ACM."},{"key":"9210_CR45","series-title":"Lecture notes in computer science, security and cryptology","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP \u201905), Brisbane, Australia, July 4\u20136, 2005","author":"M Rieback","year":"2005","unstructured":"Rieback, M., Crispo, B., & Tanenbaum, A. (2005). RFID Guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd, N. Gonz\u00e1lez, & M. Juan (Eds.), Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP \u201905), Brisbane, Australia, July 4\u20136, 2005. Lecture notes in computer science, security and cryptology (Vol. 3574, pp. 184\u2013194). Berlin: Springer. doi: 10.1007\/11506157 ."},{"key":"9210_CR46","first-page":"169","volume-title":"Proceedings of the 4th IEEE international conference on pervasive computing and communications (PerComm \u201906), Pisa, Italy","author":"M Rieback","year":"2006","unstructured":"Rieback, M., Crispo, B., & Tanenbaum, A. (2006). Is your cat infected with a computer virus? In Proceedings of the 4th IEEE international conference on pervasive computing and communications (PerComm \u201906), Pisa, Italy (pp. 169\u2013179). Washington, DC: IEEE Computer Society."},{"key":"9210_CR47","unstructured":"Riscure (2006). Privacy issue in electronic passport. http:\/\/www.riscure.com\/contact\/privacy-issue-in-electronic-passport.html . Accessed July 2009."},{"key":"9210_CR48","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/MAHSS.2005.1542879","volume-title":"Proceedings of the 2nd IEEE international conference on mobile, Ad Hoc and sensor systems (MASS\u201905)","author":"D Singlelee","year":"2005","unstructured":"Singlelee, D., & Preneel, B. (2005). Location verification using secure distance bounding protocols. In Proceedings of the 2nd IEEE international conference on mobile, Ad Hoc and sensor systems (MASS\u201905) (pp. 834\u2013840). New York: IEEE Press."},{"key":"9210_CR49","unstructured":"Swedberg, C. (2006). Broadcom introduces secure RFID chip. RFID Journal. 29 June 2006. http:\/\/rfidjournal.com\/article\/view\/2464\/1\/1 . Accessed July 2009."},{"key":"9210_CR50","unstructured":"Tanenbaum, A. (2008). Dutch public transit card broken: RFID replay attack allows free travel in The Netherlands. http:\/\/www.cs.vu.nl\/~ast\/ov-chip-card\/ . Accessed July 2009."},{"key":"9210_CR52","series-title":"Lecture notes in computer science, security and cryptology","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in cryptology \u2013 CT- RSA 2006, proceedings of the cryptographer\u2019s track at the RSA conference 2006, San Jose, CA, USA, February 13\u201317, 2006","author":"P Tuyls","year":"2006","unstructured":"Tuyls, P., & Batina, L. (2006). RFID tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology \u2013 CT- RSA 2006, proceedings of the cryptographer\u2019s track at the RSA conference 2006, San Jose, CA, USA, February 13\u201317, 2006. Lecture notes in computer science, security and cryptology (Vol. 3860, pp. 115\u2013131). Berlin: Springer. doi: 10.1007\/11605805 ."},{"key":"9210_CR53","unstructured":"Weis, S. A. (2003) Security and privacy in radio-frequency identification devices. Master\u2019s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology."},{"key":"9210_CR54","series-title":"Lecture notes in computer science","first-page":"201","volume-title":"Security in pervasive computing, proceedings of the 1st international conference in security in pervasive computing, boppard, Germany, March 12\u201314, 2003","author":"S Weis","year":"2003","unstructured":"Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. M\u00fcller, W. Stephan, & M. Ullmann (Eds.), Security in pervasive computing, proceedings of the 1st international conference in security in pervasive computing, boppard, Germany, March 12\u201314, 2003. Lecture notes in computer science (Vol. 2802, pp. 201\u2013212). Berlin: Springer. doi: 10.1007\/b95124 ."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9210-z.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T03:57:48Z","timestamp":1633751868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9210-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,29]]},"references-count":52,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["9210"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9210-z","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,29]]}}}