{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:37Z","timestamp":1725454237411},"publisher-location":"New York","reference-count":16,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_4","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T22:15:45Z","timestamp":1128896145000},"page":"47-58","source":"Crossref","is-referenced-by-count":0,"title":["How Secure are Current Mobile Operating Systems?"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Murmann","sequence":"first","affiliation":[]},{"given":"Heiko","family":"Rossnagel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2003): \u201cBSI-DSZ-CC-0216-2003\u201d at: http:\/\/www.bsi.bund.de\/zertifiz\/zert\/reporte\/0216a.pdf"},{"key":"4_CR2","unstructured":"esigl999]_DIRECTIVE 1999\/93\/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures"},{"key":"4_CR3","unstructured":"H. Fedderath: Digitale Signatur und Public Key Infrastruktur, http:\/\/www-sec.uni-regensburg.de\/security\/5PKI.pdf"},{"key":"4_CR4","first-page":"194","volume-title":"Datenschutz und Datensicherheit","author":"D. Fox","year":"1999","unstructured":"Fox, D.; Horster, P. (1999): \u201cDatenschutz und Datensicherheit\u201c in DuD, Verlag, Braunschweig, p. 194"},{"key":"4_CR5","unstructured":"R. MacDonald, S. Smith, J. Marchesini, O. Wild: Bear: An Open-Source Virtual Secure Coprocessor based on TCPA, http:\/\/www.cs.dartmouth.edu\/~sws\/papers\/msmw03.pdf"},{"key":"4_CR6","unstructured":"Mobile Electronic Transactions http:\/\/www.mobiletransaction.org\/index.html"},{"key":"4_CR7","unstructured":"Palm Website, http:\/\/www.palm.com"},{"key":"4_CR8","unstructured":"PDASecure \u2014 The encryption software, http:\/\/www.pdasecure.de\/"},{"key":"4_CR9","unstructured":"PDA Defens Website, http:\/\/www.pdadefense.com\/"},{"key":"4_CR10","first-page":"5","volume-title":"Trusted Computing Platforms \u2014 TCPA Technology in context","author":"S. Pearson","year":"2002","unstructured":"Pearson, S., et al. (2002): \u201cTrusted Computing Platforms \u2014 TCPA Technology in context\u201c, Prentice Hall PT., New Jersey, p. 5"},{"key":"4_CR11","unstructured":"B. Pfitzmann, C. St\u00fcble: PERSEUS: A Quick Open-Source Path to Secure Electronic Signatures, http.\/\/www.perseusos.org\/"},{"key":"4_CR12","unstructured":"Windows Mobile \u2014 based Pocket PCs, http:\/\/www.microsoft.com\/windowsmobile\/products\/pocketpc\/default.mspx"},{"key":"4_CR13","unstructured":"Symbian OS \u2014 the mobile operating system, http:\/\/www.symbian.com"},{"key":"4_CR14","unstructured":"TCPA \u2014 Trusted Computing Platform Alliance, http:\/\/www.trustedcomputing.org\/home"},{"key":"4_CR15","unstructured":"WinTesla v.5.31 Nokia Service Software for Windows, http:\/\/ucables.com\/nokia\/service\/wintesla.html"},{"key":"4_CR16","unstructured":"European IST Project \u201eWireless Trust for Mobile Business\u201c (WiTness), www.wireless-trust.org"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T04:55:05Z","timestamp":1619499305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_4","relation":{},"subject":[]}}