{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:59:04Z","timestamp":1742986744735,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238616"},{"type":"electronic","value":"9783319238623"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23862-3_31","type":"book-chapter","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T18:06:06Z","timestamp":1444759566000},"page":"316-325","source":"Crossref","is-referenced-by-count":0,"title":["Research on SQLite Database Encryption Technology in Instant Messaging Based on Android Platform"],"prefix":"10.1007","author":[{"given":"Aite","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Zhiqiang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yongquan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"31_CR1","unstructured":"Android, the world\u2019s most popular mobile platform (2014). http:\/\/developer.android.com\/about\/index.html"},{"key":"31_CR2","unstructured":"The Android Story (2014). http:\/\/www.android.com\/history"},{"key":"31_CR3","unstructured":"Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2, p. 2 (2011)"},{"key":"31_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4302-0172-4","volume-title":"The Definitive Guide to SQLite","author":"M Owens","year":"2006","unstructured":"Owens, M., Allen, G.: The Definitive Guide to SQLite. Apress, Berkeley (2006)"},{"key":"31_CR5","unstructured":"Kleidermacher, D.: Bringing security to Android-based devices. http:\/\/www.igmagazine-online.coin\/current\/pdf\/Pg56-58_IQ_32-Bringing\u2014Security\u2014to\u2014Android-based\u2014Devices.pdf . Accessed 22 October 2010"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSP.2009.144","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-powered mobile devices using SELinux. IEEE Secur. Priv. 8(3), 36\u201344 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Lange, M., Liebergeld, S., Lackorzynski, A., et al.: L4Android: a generic operating system framework for secure smartphones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 39\u201350. ACM (2011)","DOI":"10.1145\/2046614.2046623"},{"issue":"4","key":"31_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/1899928.1899945","volume":"44","author":"K Barr","year":"2010","unstructured":"Barr, K., Bungale, P., Deasy, S., et al.: The VMware mobile virtualization platform: is that a hypervisor in your pocket? ACM SIGOPS Oper. Syst. Rev. 44(4), 124\u2013135 (2010)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"31_CR9","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164\u2013177 (2003)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"31_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2002)"}],"container-title":["Lecture Notes in Computer Science","Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23862-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T07:37:45Z","timestamp":1692085065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23862-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238616","9783319238623"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23862-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}