{ "labelLang" : "hun", "responseDate" : "2024-03-28 18:09", "content" : { "otype" : "Book", "mtid" : 30715505, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2024-03-25T04:27:32.087+0000", "lastModified" : "2021-07-01T10:38:07.909+0000", "created" : "2019-06-18T09:23:43.203+0000", "creator" : { "otype" : "Admin", "mtid" : 10014110, "link" : "/api/admin/10014110", "label" : "Szmolyán Mária (BME admin 5 - INAKTÍV)", "familyName" : "Szmolyán", "givenName" : "Mária", "published" : true, "oldId" : 10014110, "snippet" : true }, "lastDuplumOK" : "2021-07-01T10:38:08.034+0000", "lastDuplumSearch" : "2021-07-01T10:38:08.034+0000", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000144, "link" : "/api/subtype/10000144", "label" : "Konferenciakötet (Könyv)", "name" : "Konferenciakötet", "nameEng" : "Conference proceedings", "docType" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "listPosition" : 345, "published" : true, "oldId" : 10000144, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Seberry, Jennifer", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 87409254, "link" : "/api/authorship/87409254", "label" : "Seberry, Jennifer", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Seberry", "givenName" : "Jennifer", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 87409253, "link" : "/api/authorship/87409253", "label" : "Mu, Yi", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : false, "familyName" : "Mu", "givenName" : "Yi", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 87409252, "link" : "/api/authorship/87409252", "label" : "Susilo, Willy", "listPosition" : 3, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Susilo", "givenName" : "Willy", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "Information Security and Privacy", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 18971812, "link" : "/api/publicationidentifier/18971812", "label" : "DOI: 10.1007/978-3-642-31448-3", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.1007/978-3-642-31448-3", "realUrl" : "https://doi.org/10.1007/978-3-642-31448-3", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 15685711, "link" : "/api/publicationidentifier/15685711", "label" : "ISBN: 9783642314476", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783642314476", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783642314476", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 15685712, "link" : "/api/publicationidentifier/15685712", "label" : "ISBN: 9783642314483", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783642314483", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783642314483", "published" : false, "snippet" : true } ], "volumeNumber" : "7372", "seriesMembers" : [ { "otype" : "SeriesVolume", "mtid" : 170451, "link" : "/api/seriesvolume/170451", "label" : "Lecture Notes in Computer Science 0302-9743 1611-3349, 7372", "publication" : { "otype" : "Book", "mtid" : 30715505, "link" : "/api/publication/30715505", "label" : "Seberry Jennifer et al. Information Security and Privacy. (2012) ISBN:9783642314476; 9783642314483", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000144, "link" : "/api/subtype/10000144", "label" : "Konferenciakötet (Könyv)", "name" : "Konferenciakötet", "nameEng" : "Conference proceedings", "docType" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "listPosition" : 345, "published" : true, "oldId" : 10000144, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "Information Security and Privacy", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 18971812, "link" : "/api/publicationidentifier/18971812", "label" : "DOI: 10.1007/978-3-642-31448-3", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.1007/978-3-642-31448-3", "realUrl" : "https://doi.org/10.1007/978-3-642-31448-3", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 15685711, "link" : "/api/publicationidentifier/15685711", "label" : "ISBN: 9783642314476", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783642314476", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783642314476", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 15685712, "link" : "/api/publicationidentifier/15685712", "label" : "ISBN: 9783642314483", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783642314483", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783642314483", "published" : false, "snippet" : true } ], "publishedAt" : [ { "otype" : "City", "mtid" : 10489, "link" : "/api/city/10489", "label" : "Berlin, Németország", "partOf" : { "otype" : "Country", "mtid" : 10011, "link" : "/api/country/10011", "label" : "Németország", "published" : true, "oldId" : 5, "snippet" : true }, "published" : true, "oldId" : 1022992, "snippet" : true } ], "publishedYear" : 2012, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : true, "nationalOrigin" : false, "published" : true, "snippet" : true }, "series" : { "otype" : "BookSeries", "mtid" : 20000018, "link" : "/api/bookseries/20000018", "label" : "Lecture Notes in Computer Science 0302-9743 1611-3349", "pIssn" : "0302-9743", "eIssn" : "1611-3349", "noIF" : false, "sciIndexed" : false, "scopusIndexed" : false, "lang" : "FOREIGN", "hungarian" : false, "published" : true, "snippet" : true }, "published" : false, "snippet" : true } ], "editionNumber" : 1, "publishers" : [ { "otype" : "Publisher", "mtid" : 50952, "link" : "/api/publisher/50952", "label" : "Springer Netherlands", "name" : "Springer Netherlands", "published" : true, "snippet" : true } ], "publishedAt" : [ { "otype" : "City", "mtid" : 10489, "link" : "/api/city/10489", "label" : "Berlin, Németország", "partOf" : { "otype" : "Country", "mtid" : 10011, "link" : "/api/country/10011", "label" : "Németország", "published" : true, "oldId" : 5, "snippet" : true }, "published" : true, "oldId" : 1022992, "snippet" : true } ], "firstPageOrInternalIdForSort" : "", "publishedYear" : 2012, "digital" : true, "printed" : true, "sourceYear" : 2019, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : true, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2024-03-25", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 0, "citedCount" : 0, "hasCitationDuplums" : false, "userChangeableUntil" : "2019-09-16T10:06:21.253+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 3, "ownerInstituteCount" : 12, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "chapterCount" : 1, "chapters" : [ { "otype" : "BookChapter", "mtid" : 30715504, "link" : "/api/publication/30715504", "label" : "Lee Kaleb et al. Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. (2012) Megjelent: Information Security and Privacy pp. 434-441", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 15685713, "link" : "/api/publicationidentifier/15685713", "label" : "DOI: 10.1007/978-3-642-31448-3_33", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "10.1007/978-3-642-31448-3_33", "realUrl" : "https://doi.org/10.1007/978-3-642-31448-3_33", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 15998681, "link" : "/api/publicationidentifier/15998681", "label" : "Scopus: 84864827342", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "84864827342", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84864827342", "published" : false, "snippet" : true } ], "publishedAt" : [ ], "pageLength" : 8, "publishedYear" : 2012, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : false, "published" : true, "snippet" : true } ], "fromCitation" : false, "hasQualityFactor" : false, "link" : "/api/publication/30715505", "label" : "Seberry Jennifer et al. Information Security and Privacy. (2012) ISBN:9783642314476; 9783642314483", "template" : "