{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:38:10Z","timestamp":1725791890941},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319065373"},{"type":"electronic","value":"9783319065380"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06538-0_30","type":"book-chapter","created":{"date-parts":[[2014,4,12]],"date-time":"2014-04-12T08:57:44Z","timestamp":1397293064000},"page":"305-314","source":"Crossref","is-referenced-by-count":5,"title":["Secure Cloud Computing"],"prefix":"10.1007","author":[{"given":"Wolfgang A.","family":"Halang","sequence":"first","affiliation":[]},{"given":"Maytiyanin","family":"Komkhao","sequence":"additional","affiliation":[]},{"given":"Sunantha","family":"Sodsee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Fortschr.-Ber. 10, 826","first-page":"226","volume-title":"Networked Information Systems","author":"G. Fahrnberger","year":"2013","unstructured":"Fahrnberger, G.: SecureString 2.0 \u2013 A Cryptosystem for Computing on Encrypted Character Strings in Clouds. In: Eichler, G., Gumzej, R. (eds.) Networked Information Systems. Fortschr.-Ber. 10, 826, pp. 226\u2013240. VDI Verlag, D\u00fcsseldorf (2013)"},{"key":"30_CR2","first-page":"349","volume-title":"SAFECOMP 1993","author":"W.A. Halang","year":"1993","unstructured":"Halang, W.A., Witte, M.: A Virus-Resistent Network Interface. In: G\u00f3rski, J. (ed.) SAFECOMP 1993, pp. 349\u2013357. Springer, Heidelberg (1993)"},{"key":"30_CR3","unstructured":"Halang, W.A., Fitz, R.: Speichersegmentierung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Eindringen. German patent application DE\u00a0100\u00a031\u00a0212\u00a0A1 (2000)"},{"key":"30_CR4","unstructured":"Halang, W.A., Fitz, R.: Kontextsensitive Speicherzuordnung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Aussp\u00e4hen und Manipulieren von Daten. German patent application DE\u00a0100\u00a031\u00a0209\u00a0A1 (2000)"},{"key":"30_CR5","unstructured":"Halang, W.A., Fitz, R.: Ger\u00e4tetechnische Schreibschutzkopplung zum Schutz digitaler Datenverarbeitungsanlagen vor Eindringlingen w\u00e4hrend der Installationsphase von Programmen. German patent 10051941 since 20 October (2000)"},{"key":"30_CR6","unstructured":"Halang, W.A., Fitz, R.: Offenbarendes Verfahren zur \u00dcberwachung ausf\u00fchrbarer oder interpretierbarer Daten in digitalen Datenverarbeitungsanlagen mittels ger\u00e4tetechnischer Einrichtungen. German patent application DE\u00a0100\u00a055\u00a0118\u00a0A1 (2000)"},{"key":"30_CR7","unstructured":"Halang, W.A., Komkhao, M., Sodsee, S.: A Stream Cipher Obliterating Data Element Boundaries. Thai Patent Registration (2014)"},{"key":"30_CR8","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires. 9. Serie (1883)"},{"key":"30_CR9","series-title":"Fortschr.-Ber. 10, 777","volume-title":"Spatiotemporal Chaos-based Multimedia Cryptosystems","author":"P. Li","year":"2007","unstructured":"Li, P.: Spatiotemporal Chaos-based Multimedia Cryptosystems. Fortschr.-Ber. 10, 777. VDI-Verlag, D\u00fcsseldorf (2007)"},{"key":"30_CR10","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"30_CR11","first-page":"21","volume-title":"Mehrseitige Sicherheit in der Kommunikationstechnik","author":"K. Rannenberg","year":"1997","unstructured":"Rannenberg, K., Pfitzmann, A., M\u00fcller, G.: Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 21\u201329. Addison-Wesley, Bonn (1997)"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"issue":"3","key":"30_CR13","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00287-010-0487-6","volume":"34","author":"W.G. Spruthm","year":"2011","unstructured":"Spruthm, W.G., Rosenstiel, W.: Revitalisierung der akademischen Gro\u00dfrechnerausbildung. Informatik Spektrum\u00a034(3), 295\u2013303 (2011)","journal-title":"Informatik Spektrum"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06538-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T15:43:09Z","timestamp":1558885389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06538-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319065373","9783319065380"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06538-0_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}