{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:44:11Z","timestamp":1725878651752},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319512334"},{"type":"electronic","value":"9783319512341"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-51234-1_9","type":"book-chapter","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T03:29:13Z","timestamp":1484882953000},"page":"58-63","source":"Crossref","is-referenced-by-count":0,"title":["Why Hackers Love eHealth Applications"],"prefix":"10.1007","author":[{"given":"Rohit","family":"Goyal","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,21]]},"reference":[{"key":"9_CR1","unstructured":"OWASP: Authentication Cheat Sheet, May 2015. https:\/\/www.owasp.org\/index.php\/Authentication_Cheat_Sheet"},{"key":"9_CR2","unstructured":"Charles proxy, May 2015. https:\/\/www.charlesproxy.com\/"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials (2016). doi: 10.1109\/COMST.2016.2548426","DOI":"10.1109\/COMST.2016.2548426"},{"key":"9_CR4","unstructured":"Cross-site Scripting (XSS), May 2015. https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)"},{"key":"9_CR5","unstructured":"Description of the Server Authentication Process During the SSL Handshake, May 2015. https:\/\/support.microsoft.com\/en-us\/kb\/257587"},{"key":"9_CR6","unstructured":"Gemalto: First Half Review 2015, May 2015. http:\/\/www.gemalto.com\/brochures-site\/download-site\/Documents\/Gemalto_H1_2015_BLI_Report.pdf"},{"issue":"3","key":"9_CR7","doi-asserted-by":"crossref","first-page":"e86","DOI":"10.2196\/mhealth.4649","volume":"3","author":"M Jaensson","year":"2015","unstructured":"Jaensson, M., et al.: The development of the recovery assessments by phone points (RAPP): a mobile phone app for postoperative recovery monitoring and assessment. JMIR mHealth uHealth 3(3), e86 (2015)","journal-title":"JMIR mHealth uHealth"},{"key":"9_CR8","unstructured":"To, H.: Protect Forms Authentication in ASP.NET 2.0, May 2015. https:\/\/msdn.microsoft.com\/en-us\/library\/ff648341.aspx"},{"key":"9_CR9","unstructured":"HTML5 Security Cheat Sheet, May 2015. https:\/\/www.owasp.org\/index.php\/HTML5_Security_Cheat_Sheet"},{"key":"9_CR10","unstructured":"HTTPS protocol, May 2015. https:\/\/en.wikipedia.org\/wiki\/HTTPS"},{"key":"9_CR11","unstructured":"Password strength, May 2015. https:\/\/www.grc.com\/haystack.htm"},{"key":"9_CR12","unstructured":"PKI (Public Key Infrastructure), May 2015. http:\/\/searchsecurity.techtarget.com\/definition\/PKI"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Things Technologies for HealthCare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51234-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:40:59Z","timestamp":1498380059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51234-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319512334","9783319512341"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51234-1_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}