{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:02:58Z","timestamp":1725822178062},"publisher-location":"Cham","reference-count":0,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319188010"},{"type":"electronic","value":"9783319188027"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18802-7_43","type":"book-chapter","created":{"date-parts":[[2015,5,20]],"date-time":"2015-05-20T01:41:04Z","timestamp":1432086064000},"page":"322-334","source":"Crossref","is-referenced-by-count":0,"title":["Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Adeka","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Ngala","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Bin-Melha","sequence":"additional","affiliation":[]},{"given":"E.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Simon J.","family":"Shepherd","sequence":"additional","affiliation":[]},{"given":"Issa T. E.","family":"Elfergani","sequence":"additional","affiliation":[]},{"given":"Ash S.","family":"Hussaini","sequence":"additional","affiliation":[]},{"given":"Fauzi","family":"Elmegri","sequence":"additional","affiliation":[]},{"given":"Raed","family":"Abd-Alhameed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,21]]},"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18802-7_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T06:36:03Z","timestamp":1435127763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18802-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319188010","9783319188027"],"references-count":0,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18802-7_43","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}