{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:38Z","timestamp":1725797138329},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_8","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T16:39:43Z","timestamp":1135355983000},"page":"119-134","source":"Crossref","is-referenced-by-count":0,"title":["Security in Globally Distributed Industrial Information Systems"],"prefix":"10.1007","author":[{"given":"Petri","family":"Saloma","sequence":"first","affiliation":[]},{"given":"Ronja","family":"Addams-Moring","sequence":"additional","affiliation":[]},{"given":"Teemupekka","family":"Virtanen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Security Engineering","author":"R Anderson","year":"2001","unstructured":"Anderson, Ross (2001). Security Engineering. John Wiley & Sons, USA."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/S0167-4048(99)80008-X","volume":"18","author":"W Caelli","year":"1999","unstructured":"Caelli, William J., Dawson, Edward P., and Rea, Scott A. (1999). PKI, elliptic curve cryptography, and digital signatures. Computers & Security, 18:47\u201366.","journal-title":"Computers & Security"},{"key":"8_CR3","volume-title":"Security along the path through gprs towards 3g mobile telephone network data services, version 1.3. SANS Institute 2002, As part of the Information Security Reading Room","author":"D Chang","year":"2002","unstructured":"Chang, Dung (2002). Security along the path through gprs towards 3g mobile telephone network data services, version 1.3. SANS Institute 2002, As part of the Information Security Reading Room, referenced 27.9.2003."},{"key":"8_CR4","volume-title":"European Telecommunications Standards Institute. GSM calls even more secure \u2014 thanks to new A5\/3 algorithm","author":"ETSI","year":"2003","unstructured":"ETSI, European Telecommunications Standards Institute. GSM calls even more secure \u2014 thanks to new A5\/3 algorithm, referenced 17.10.2003."},{"key":"8_CR5","unstructured":"Naedele, Martin. IT security for safety-critical automation systems. ABB."},{"key":"8_CR6","volume-title":"GPRS security \u2014 secure remote connections over GPRS. Technical University of Helsinki","author":"J Rautpalo","year":"2000","unstructured":"Rautpalo, Jussi (2000). GPRS security \u2014 secure remote connections over GPRS. Technical University of Helsinki, Department of Computer Science, referenced 27.9.2003."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(01)00815-7","volume":"2001","author":"W Schwartau","year":"2001","unstructured":"Schwartau, Winn (2001). Network security it\u2019s about time: An offer for a metric. Network Security, 2001:11\u201313.","journal-title":"Network Security"},{"key":"8_CR8","unstructured":"Vaisala. National lightning detection network, referenced 24.10.2003."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/S0167-4048(03)00507-8","volume":"22","author":"S Vanstone","year":"2003","unstructured":"Vanstone, S.A. (2003). Next generation security for wireless: elliptic curve cryptography. Computers & Security, 22:412\u2013415.","journal-title":"Computers & Security"}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T15:01:34Z","timestamp":1548082894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_8","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}