{ "labelLang" : "hun", "responseDate" : "2024-03-29 12:51", "content" : { "otype" : "BookChapter", "mtid" : 30861818, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2021-10-11T15:22:47.034+0000", "lastModified" : "2019-10-31T11:46:40.278+0000", "created" : "2019-10-25T11:18:40.640+0000", "creator" : { "otype" : "Admin", "mtid" : 10014110, "link" : "/api/admin/10014110", "label" : "Szmolyán Mária (BME admin 5 - INAKTÍV)", "familyName" : "Szmolyán", "givenName" : "Mária", "published" : true, "oldId" : 10014110, "snippet" : true }, "lastDuplumOK" : "2020-02-18T18:17:25.706+0000", "lastDuplumSearch" : "2020-02-18T18:17:25.706+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000398, "link" : "/api/subtype/10000398", "label" : "Könyvfejezet (Könyvrészlet)", "name" : "Könyvfejezet", "nameEng" : "Chapter", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 220, "published" : true, "oldId" : 10000398, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Vahedi, E.", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 88332521, "link" : "/api/authorship/88332521", "label" : "Vahedi, E. ✉", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "corresponding" : true, "familyName" : "Vahedi", "givenName" : "E.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 88332522, "link" : "/api/authorship/88332522", "label" : "Wong, V.W.S.", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : false, "corresponding" : false, "familyName" : "Wong", "givenName" : "V.W.S.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 88332523, "link" : "/api/authorship/88332523", "label" : "Blake, I.F. ✉", "listPosition" : 3, "share" : 0.0, "first" : false, "last" : true, "corresponding" : true, "familyName" : "Blake", "givenName" : "I.F.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "An overview of cryptography", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 16001720, "link" : "/api/publicationidentifier/16001720", "label" : "DOI: 10.4018/978-1-4666-4707-7.ch005", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.4018/978-1-4666-4707-7.ch005", "realUrl" : "https://doi.org/10.4018%2F978-1-4666-4707-7.ch005", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 16001719, "link" : "/api/publicationidentifier/16001719", "label" : "Scopus: 84945137970", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "idValue" : "84945137970", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84945137970", "published" : false, "snippet" : true } ], "firstPage" : "102", "lastPage" : "130", "firstPageOrInternalIdForSort" : "102", "pageLength" : 29, "publishedYear" : 2014, "digital" : null, "printed" : null, "sourceYear" : 2019, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2021-10-11", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "referenceList" : "Ahmed, E.G., Shaaban, E., Hashem, M., Lightweight mutual authentication protocol for low cost RFID tags (2010) International Journal of Network Security and its Applications, 1, pp. 27-37 ;\n Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I., (2006) An elliptic curve processor suitable for RFID tags, , 1st Benelux Workshop on Information and System Security (WISSec 2006), Belguim ;\n Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I., (2007) Public-key cryptography for RFID tags, , Fifth Annual International Conference on Pervasive Computing and Communications Workshop. New York ;\n Batina, L., Guajardo, J., Preneel, B., Tuyls, P., Verbauwhede, I., Public key cryptography for RFID tags and applications (2009) RFID security: Techniques, protocols and system-on-chip design, , P. Kitsos, & Y. Zhang (Eds.), Springer-Verlag ;\n Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I., (2007) Public key cryptography on the top of a needle, , IEEE International Symposium on Circuits and Systems (ISCAS 2007), Special Session: Novel Cryptographic Architectures for Low-Cost RFID. New Orleans ;\n Batina, L., Seys, S., Preneel, B., Verbauwhede, I., Public key primitves (2008) Wireless sensor network security, pp. 77-108. , IOS Press ;\n Blake, I.F., Seroussi, G., Smart, N., (1999) Elliptic curves in cryptography, , Cambridge University Press ;\n Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Vikkelsoe, C., PRESENT: An ultra-lighweight block cipher (2007) CHES 2007: LNCS, pp. 450-466. , P. Paillier & I. Verbauwhede (Eds.), Santa Barbara ;\n Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Hash functions and RFID tags: Mind the gap (2008) CHES 2007, LNCS 5154, pp. 283-299. , E. Oswald, & P. Rohatgi (Eds.), doi:10.1007/978-3-540-85053-3_18 ;\n Calmels, B., Canard, S., Girault, M., Sibert, H., Low-cost cryptography for privacy in RFID systems (2006) Smart Card Research and Advanced Applications, LNCS, 3928, pp. 237-251 ;\n Charles, D.X., Goren, E.Z., Lauter, K.E., (2006) Cryptographic hash functions from expander graphs, , 2nd NIST Hash Functions Workshop ;\n Cranfield, R., Pomerance, C., (2001) Prime numbers: A computational perspective, , Springer-Verlag ;\n Diffie, W., Hellman, M., New directions in cryptography (1976) IEEE Transactions on Information Theory, 22, pp. 644-654 ;\n Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L., A survey of lightweightcryptography implementations (2007) IEEE Design & Test of Computers, 24, pp. 522-533 ;\n ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms (1985) IEEE Transactions on Information Theory, 31, pp. 469-472 ;\n Feldhofer, M., Dominikus, S., Wolkerstorfer, J., Strong authentication for RFID systems using the AES algorithm (2004) CHES 2004, LNCS 3156, pp. 357-370. , M. Joye, & J.-J. Quisquater (Eds.), Boston. doi:10.1007/978-3-540-28632-5_26 ;\n Data encryption standard (1977), Federal Information Processing Standard. NIST, Department of Commerce, Washington, D.C ;\n DES modes of operation (1980), Federal Information Processing Standard, NIST, Department of Commerce, Washington, D.C ;\n (1995) Secure hash standard. Federal Information Processing Standard, NIST, pp. 180-181. , Washington, D.C.: Department of Commerce ;\n Digital signature algorithm (2000), Federal Information Processing Standard, NIST, Department of Commerce, Washington, D.C ;\n Advanced encryption standard (2001), Federal Information Processing Standard, NIST, Department of Commerce, Washington, D.C ;\n (2003) Secure hash standard. Federal Information Processing Standard, NIST, pp. 180-182. , Washington, D.C.: Department of Commerce ;\n Girault, M., Self certified public keys (1991) EUROCRYPT '91, LNCS 547, pp. 490-497. , D. Davies (Ed.), UK ;\n Hankerson, D., Menezes, A.J., Vanstone, S., (2004) Guide to elliptic curve cryptography, , Springer Verlag ;\n Hoffstein, J., Pipher, J., Silverman, J., (2008) An introduction to mathematical cryptography, , Springer Press Verlag ;\n Hopper, N.J., Blum, M., (2000) A secure human-computer authentication scheme, , (Report CMU-CS-00-139) ;\n Katz, J., Lindell, Y., (2008) Introduction to modern cryptography. Chapman and Hall, , CRC Press ;\n Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I., Elliptic-curve-based security processor for RFID security (2008) IEEE Transactions on Computers, 57, pp. 1514-1527 ;\n McLoone, M., Robshaw, M.J.B., Public key cryptography and RFID tags (2007) CT-RSA 2007 LNCS 4377, pp. 372-384. , M. Abe (Ed.), San Francisco ;\n Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., (1996) Handbook of applied cryptography, , http://www.cacr.math.uwaterloo.ca/hac/, CRC Press. Retrieved from ;\n Merkle, R.C., A fast software one-way hash function (1990) Journal of Cryptology, 3, pp. 43-58 ;\n Ohta, K., Okamoto, T., Practical extension of Fiat-Shamir scheme (1988) Electronics Letters, 24, pp. 955-956 ;\n Peris-Lopez, P., Hernandez-Castro, J., Tapiador, J.M.E., Ribagorda, A., (2006) LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, , Workshop on RFID Security (RFIDSec'06), Austria ;\n Poschmann, A., (2009) Lightweight cryptography:Cryptographic engineering for a pervasive world, , Dissertation, Doktor-Ingenieur, Ruhr-University Bochum ;\n Poschmann, A., Leander, G., Schramm, K., Paar, C., (2006) New lightweight crypto algorithms for RFID, , Workshop on RFID Security (RFIDSec'06), Austria ;\n Preneel, B., The first 30 years of cryptographic hash functions and the NIST SHA-3 competition (2010) CT-RSA 2010, LNCS 5985, pp. 1-14. , J. Pieprzyk (Ed.), doi:10.1007/978-3-642-11925-5_1 ;\n Rolfes, C., Poschmann, A., Leander, G., Paar, C., Ultra-lightweight implementations for smart devices-Security for 1000 gate equivalents (2008) CARDIS 2008 LNCS 5189, pp. 89-103. , G. Grimaud, & F. X. Standaert (Eds.), doi:10.1007/978-3-540-85893-5_7 ;\n Schnorr, C., Efficient identification and signatures for smart cards (1990) Advances in Cryptology, Crypto '89. LNCS, 435, pp. 239-252 ;\n Shamir, A., SQUASH-A new MAC with provable security properties for highly constrained devices such as RFID tags (2008) FSE 2008 LNCS 5086, pp. 144-157. , K. Nyberg (Ed.), doi:10.1007/978-3-540-71039-4_9 ;\n Shannon, C.E., Communication theory of secrecy (1948) The Bell System Technical Journal, 28, pp. 656-715 ;\n Smart, N., (2003) Cryptography: An introduction, , McGraw-Hill ;\n Stinson, D., (1995) Cryptography: Theory and practice, , CRC Press ;\n Tsudik, G., A family of dunces: Trivial RFID identification and authentication protocols (2007) PET 2007, pp. 45-61. , N. Borisov & P. Golle (Eds.), LNCS 4776 ;\n Vajda, I., Buttyan, L., (2003) Lightweight authentication protocols for low-cost RFID tags, , 2nd Workshop on Security in Ubiquitous Computing ;\n Washington, L.C., (2003) Elliptic curves: Number theory and cryptography, , Chapman and Hall, CRC Pres", "hasCitationDuplums" : false, "userChangeableUntil" : "2020-01-29T11:35:48.923+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 2, "ownerInstituteCount" : 10, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 30286403, "link" : "/api/publication/30286403", "label" : "Ehsan Vahedi. Crisis Management: Concepts, Methodologies, Tools, and Applications. (2014) ISBN:9781466647084", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000201, "link" : "/api/subtype/10000201", "label" : "Szakkönyv (Könyv)", "name" : "Szakkönyv", "nameEng" : "Monograph", "docType" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "listPosition" : 337, "published" : true, "oldId" : 10000201, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "Crisis Management: Concepts, Methodologies, Tools, and Applications", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 13607033, "link" : "/api/publicationidentifier/13607033", "label" : "ISBN: 9781466647084", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781466647084", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781466647084", "published" : false, "snippet" : true } ], "publishedAt" : [ { "otype" : "City", "mtid" : 10297, "link" : "/api/city/10297", "label" : "Hershey (PA), Amerikai Egyesült Államok", "partOf" : { "otype" : "Country", "mtid" : 10017, "link" : "/api/country/10017", "label" : "Amerikai Egyesült Államok", "published" : true, "oldId" : 13, "snippet" : true }, "published" : true, "oldId" : 511, "snippet" : true } ], "publishedYear" : 2014, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : false, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/30861818", "label" : "Vahedi E. et al. An overview of cryptography. (2014) Megjelent: Crisis Management: Concepts, Methodologies, Tools, and Applications pp. 102-130", "template" : "