{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:37Z","timestamp":1759132057815,"version":"3.40.3"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459301"},{"type":"electronic","value":"9783319459318"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45931-8_5","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T07:26:19Z","timestamp":1474010779000},"page":"70-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments"],"prefix":"10.1007","author":[{"given":"Vassilios","family":"Vassilakis","sequence":"first","affiliation":[]},{"given":"Emmanouil","family":"Panaousis","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","volume":"52","author":"F Boccardi","year":"2014","unstructured":"Boccardi, F., Heath, R.W., Lozano, A., Marzetta, T.L., Popovski, P.: Five disruptive technology directions for 5G. IEEE Commun. Mag. 52(2), 74\u201380 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"9","key":"5_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2015.7263370","volume":"53","author":"S Andreev","year":"2015","unstructured":"Andreev, S., et al.: Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap. IEEE Commun. Mag. 53(9), 32\u201340 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Vardakas, J.S., Zorba, N., Skianis, C., Verikoukis, C.V.: Performance analysis of M2M communication networks for QoS-differentiated smart grid applications. In: IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOMW.2015.7414116"},{"issue":"17","key":"5_CR4","first-page":"6","volume":"54","author":"S Patel","year":"2012","unstructured":"Patel, S., Malhar, C., Kapadiya, K.: 5G: Future mobile technology - vision 2020. Int. J. Comput. Appl. 54(17), 6\u201310 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2013.6476878","volume":"51","author":"JG Andrews","year":"2013","unstructured":"Andrews, J.G.: Seven ways that HetNets are a cellular paradigm shift. IEEE Commun. Mag. 51(3), 136\u2013144 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"5_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2014.6815890","volume":"52","author":"A Osseiran","year":"2014","unstructured":"Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26\u201335 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Trakas, P., Adelantado, F., Verikoukis, C.: A novel learning mechanism for traffic offloading with small cell as a service. In: IEEE International Conference on Communications (ICC), London, U.K. (2015)","DOI":"10.1109\/ICC.2015.7249424"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Giannoulakis, I., et al.: System architecture and aspects of SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services. In: 2nd IEEE Conference on Network Softwarization (NetSoft), Workshop on Software Defined 5G Networks (Soft5G), Seoul, Korea (2016)","DOI":"10.1109\/NETSOFT.2016.7502483"},{"issue":"2","key":"5_CR9","first-page":"1","volume":"3","author":"D Soldani","year":"2014","unstructured":"Soldani, D., Manzalini, A.: A 5G infrastructure for anything-as-a-service. J. Telecommun. Syst. Manag. 3(2), 1\u201310 (2014)","journal-title":"J. Telecommun. Syst. Manag."},{"issue":"5","key":"5_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27\u201332 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"5_CR11","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. arXiv preprint \n                      arxiv:1602.00484\n                      \n                     (2016)"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","volume":"53","author":"B Han","year":"2015","unstructured":"Han, B., Gopalakrishnan, V., Ji, L., Lee, S.: Network function virtualization: challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90\u201397 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2015.7113224","volume":"29","author":"R Yu","year":"2015","unstructured":"Yu, R., Xue, G., Kilari, V., Zhang, X.: Network function virtualization in the multi-tenant cloud. IEEE Netw. 29(3), 42\u201347 (2015)","journal-title":"IEEE Netw."},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MNET.2015.7064899","volume":"29","author":"P Ameigeiras","year":"2015","unstructured":"Ameigeiras, P., et al.: Link-level access cloud architecture design based on SDN for 5G networks. IEEE Netw. 29(2), 24\u201331 (2015)","journal-title":"IEEE Netw."},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.2015.7113226","volume":"29","author":"S Sun","year":"2015","unstructured":"Sun, S., Kadoch, M., Gong, L., Rong, B.: Integrating network function virtualization with SDR and SDN for 4G\/5G networks. IEEE Netw. 29(3), 54\u201359 (2015)","journal-title":"IEEE Netw."},{"key":"5_CR16","unstructured":"EC H2020 Small sElls coordinAtion for Multi-tenancy and Edge services (SESAME) Project, July 2016. \n                      https:\/\/5g-ppp.eu\/sesame\/"},{"key":"5_CR17","unstructured":"EC H2020 5G-ENSURE, July 2016. \n                      https:\/\/5g-ppp.eu\/5g-ensure\/"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Mantas, G., et al.: Security for 5G Communications. Fundamentals of 5G Mobile Netw. John Wiley & Sons Ltd. (2015)","DOI":"10.1002\/9781118867464.ch9"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Fang, Q., Weijie, Z., Guojun, W., Hui, F.: Unified security architecture research for 5G wireless system. In: 11th Web Information System and Application Conference, Tianjin, China (2014)","DOI":"10.1109\/WISA.2014.25"},{"issue":"4","key":"5_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang, N., et al.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20\u201327 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28\u201335 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Vassilakis, V.G., Moscholios, I.D., Alzahrani, B.A., Logothetis, M.D.: A software-defined architecture for next-generation cellular networks. In: IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia (2016)","DOI":"10.1109\/ICC.2016.7511018"},{"issue":"7","key":"5_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2013.6553677","volume":"51","author":"K Pentikousis","year":"2013","unstructured":"Pentikousis, K., Wang, Y., Hu, W.: Mobileflow: toward software-defined mobile networks. IEEE Commun. Mag. 51(7), 44\u201353 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Fajardo, J.O., et al.: Introducing mobile edge computing capabilities through distributed 5G cloud enabled small cells. Mobile Netw. Appl., 1\u201311 (2016). Springer, US","DOI":"10.1007\/s11036-016-0752-2"},{"key":"5_CR25","first-page":"143","volume-title":"Introduction to Hardware Security and Trust","author":"Sergei Skorobogatov","year":"2011","unstructured":"Skorobogatov, S.: Physical attacks and tamper resistance. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, pp. 143\u2013173. Springer, New York (2012)"},{"key":"5_CR26","unstructured":"Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December 2009"},{"issue":"1","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"9","key":"5_CR28","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1016\/j.jss.2012.12.025","volume":"86","author":"MD Ryan","year":"2013","unstructured":"Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263\u20132268 (2013)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"9","key":"5_CR30","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1016\/j.jss.2013.03.011","volume":"86","author":"H Mouratidis","year":"2013","unstructured":"Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9), 2276\u20132293 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"5_CR31","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey (2015)","DOI":"10.1109\/PST.2015.7232966"},{"issue":"2","key":"5_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10998-012-4631-8","volume":"65","author":"MJ Mihaljevic","year":"2012","unstructured":"Mihaljevic, M.J., Gangopadhyay, S., Paul, G., Imai, H.: Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Periodica Math. Hungarica 65(2), 205\u2013227 (2012)","journal-title":"Periodica Math. Hungarica"},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-40588-4_25","volume-title":"Security Engineering and Intelligence Informatics","author":"N Gobbo","year":"2013","unstructured":"Gobbo, N., Merlo, A., Migliardi, M.: A denial of service attack to GSM networks via attach procedure. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES Workshops 2013. LNCS, vol. 8128, pp. 361\u2013376. Springer, Heidelberg (2013)"},{"issue":"3","key":"5_CR35","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TDSC.2014.2315198","volume":"11","author":"A Merlo","year":"2014","unstructured":"Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F., Castiglione, A.: A denial of service attack to UMTS networks using SIM-less devices. IEEE Trans. Depend. Secure Comput. 11(3), 280\u2013291 (2014)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-07788-8_40","volume-title":"Distributed, Ambient, and Pervasive Interactions","author":"A Fragkiadakis","year":"2014","unstructured":"Fragkiadakis, A., Askoxylakis, I., Chatziadam, P.: Denial-of-service attacks in wireless networks using off-the-shelf hardware. In: Streitz, N., Markopoulos, P. (eds.) DAPI 2014. LNCS, vol. 8530, pp. 427\u2013438. Springer, Heidelberg (2014)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Armando, A., Costa, G., Merlo, A.: Bring your own device, securely. In: 28th ACM Symposium on Applied Computing, Coimbra, Portugal (2013)","DOI":"10.1145\/2480362.2480707"},{"key":"5_CR38","unstructured":"Davi, L., et al.: MoCFI: a framework to mitigate control-flow attacks on smartphones. In: 19th Annual Network & Distributed System Security Symposium, San Diego, USA (2012)"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Wang, L.B., Wei, G.H., Li, Z.: Research of defense scheme against buffer overflow attack in embedded system. J. Comput. Appl. 12 (2012)","DOI":"10.3724\/SP.J.1087.2012.03449"},{"issue":"2","key":"5_CR40","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MNET.2015.7064898","volume":"29","author":"H Wang","year":"2015","unstructured":"Wang, H., Chen, S., Xu, H., Ai, M., Shi, Y.: SoftNet: a software defined decentralized mobile network architecture toward 5G. IEEE Netw. 29(2), 16\u201322 (2015)","journal-title":"IEEE Netw."},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Vassilakis, V.G., Moscholios, I.D., Alzahrani, B.A., Logothetis, M.D.: On the security of software-defined next-generation cellular networks. In: IEICE Information and Communication Technology Forum (ICTF), Patras, Greece (2016)","DOI":"10.1109\/ICC.2016.7511018"},{"issue":"1","key":"5_CR42","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1866739.1866754","volume":"54","author":"E Kotsovinos","year":"2011","unstructured":"Kotsovinos, E.: Virtualization: Blessing or curse? Commun. ACM 54(1), 61\u201365 (2011)","journal-title":"Commun. ACM"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Barthe, G., Betarte, G., Campo, J.D., Luna, C.: Cache-leakage resilient OS isolation in an idealized model of virtualization. In: IEEE 25th Computer Security Foundations Symposium, Cambridge, USA (2012)","DOI":"10.1109\/CSF.2012.17"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.: Implementing TLS with verified cryptographic security. In: 34th IEEE Symposium on Security and Privacy, San Francisco, USA (2013)","DOI":"10.1109\/SP.2013.37"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Rostami, M., Koushanfar, F., Rajendran, J., Karri, R.: Hardware security: threat models and metrics. In: 32nd IEEE\/ACM International Conference on Computer-Aided Design, San Jose, CA (2013)","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Findling, R.D., Mayrhofer, R.: Towards device-to-user authentication: protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns. In: 14th ACM International Conference on Mobile and Ubiquitous Multimedia, pp. 131\u2013135 (2015)","DOI":"10.1145\/2836041.2836053"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: 8th ACM International Workshop on Security in Cloud Computing, Hangzhou, China, pp. 3\u201310 (2013)","DOI":"10.1145\/2484402.2484406"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: 4th ACM European Workshop on System Security, Salzburg, Austria (2011)","DOI":"10.1145\/1972551.1972552"},{"issue":"3","key":"5_CR49","first-page":"124","volume":"18","author":"MT Hoesing","year":"2009","unstructured":"Hoesing, M.T.: Virtualization security assessment. Inf. Secur. J.: A Global Perspect. 18(3), 124\u2013130 (2009)","journal-title":"Inf. Secur. J.: A Global Perspect."},{"issue":"1","key":"5_CR50","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MCOM.2015.7010527","volume":"53","author":"F Giust","year":"2015","unstructured":"Giust, F., Cominardi, L., Bernardos, C.: Distributed mobility management for future 5G networks: overview and analysis of existing approaches. IEEE Commun. Mag. 53(1), 142\u2013149 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"10","key":"5_CR51","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/MCOM.2015.7295478","volume":"53","author":"PY Chen","year":"2015","unstructured":"Chen, P.Y., Cheng, S.M., Ting, P.S., Lien, C.W., Chu, F.J.: When crowdsourcing meets mobile sensing: a social network perspective. IEEE Commun. Mag. 53(10), 157\u2013163 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"5_CR52","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MNET.2015.7064901","volume":"29","author":"Q Han","year":"2015","unstructured":"Han, Q., Liang, S., Zhang, H.: Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world. IEEE Netw. 29(2), 40\u201345 (2015)","journal-title":"IEEE Netw."},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Goktas, E., Athanasopoulos, E., Bos, H., Portokalidis, G.: Out of control: overcoming control-flow integrity. In: 35th IEEE Symposium on Security and Privacy, San Jose, CA (2014)","DOI":"10.1109\/SP.2014.43"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Nikaein, N., et al.: Network store: exploring slicing in future 5G networks. In: 10th International ACM Workshop on Mobility in the Evolving Internet Architecture, Paris, France (2015)","DOI":"10.1145\/2795381.2795390"},{"issue":"2","key":"5_CR55","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MWC.2014.6812298","volume":"21","author":"WH Chin","year":"2014","unstructured":"Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 21(2), 106\u2013112 (2014)","journal-title":"IEEE Wirel. Commun."},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Luo, S., Lin, Z., Chen, X., Yang, Z., Chen, J.: Virtualization security for cloud computing service. In: 4th International Conference on Cloud and Service Computing (CSC), 174\u2013179 (2011)","DOI":"10.1109\/CSC.2011.6138516"},{"key":"5_CR57","doi-asserted-by":"crossref","unstructured":"Oyama, Y., Giang, T.T., Chubachi, Y., Shinagawa, T., Kato, K.: Detecting malware signatures in a thin hypervisor. In: 27th Annual ACM Symposium on Applied Computing, Trento, Italy (2012)","DOI":"10.1145\/2245276.2232070"},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Hu, C., Li, Z., Ma, J., Guo, T., Shi, Z.: File parsing vulnerability detection with symbolic execution. In: IEEE 6th International Symposium on Theoretical Aspects of Software Engineering, Beijing, China (2012)","DOI":"10.1109\/TASE.2012.13"},{"key":"5_CR59","unstructured":"Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.: Software-defined mobile networks security. Mob. Netw. Appl., 1\u201315 (2015)"},{"key":"5_CR60","first-page":"449","volume-title":"Internet of Things (IoT) in 5G Mobile Technologies","author":"Sukirna Roy","year":"2016","unstructured":"Roy, S., Manoj, B.S.: IoT enablers and their security and privacy issues. In: Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M. (eds.) Internet of Things (IoT) in 5G Mobile Technologies. Modeling and Optimization in Science and Technologies, vol. 8, pp. 449\u2013482. Springer International Publishing, Switzerland (2016)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45931-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:18:21Z","timestamp":1600474701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45931-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459301","9783319459318"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45931-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}