{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:39:39Z","timestamp":1742945979496,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_20","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"296-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Peripherals in a Converged Mobile Environment"],"prefix":"10.1007","author":[{"given":"Jaco","family":"du Toit","sequence":"first","affiliation":[]},{"given":"Ian","family":"Ellefsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"du Toit, J., Ellefsen, I.: Location aware mobile device management. In: 2015 Information Security for South Africa, Rosebank, pp. 1\u20138 (2015)","DOI":"10.1109\/ISSA.2015.7335059"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"du Toit, J., Ellefsen, I.: A model for secure mobile computing. In: Science and Information Conference (SAI), London, pp. 1213\u20131221 (2015)","DOI":"10.1109\/SAI.2015.7237299"},{"key":"20_CR3","unstructured":"Kaspersky Lab. Spyware Definition and Prevention. http:\/\/usa.kaspersky.com\/internet-security-center\/threats\/spyware#.WIxoWUQ2u00. Accessed 28 Jan 2017"},{"key":"20_CR4","unstructured":"Trend Micro. Spyware - Threat Encyclopedia. http:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/spyware. Accessed 28 Jan 2017"},{"key":"20_CR5","unstructured":"KeeLog. KeyGrabber - Hardware Keylogger - WiFi USB Hardware Keyloggers. https:\/\/www.keelog.com. Accessed 28 Jan 2017"},{"key":"20_CR6","unstructured":"KeyCarbon LLC. KeyCarbon Computer Security Hardware. http:\/\/www.keycarbon.com. Accessed 28 Jan 2017"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-26362-5_2","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"RM Gerdes","year":"2015","unstructured":"Gerdes, R.M., Mallick, S.: Physical-layer detection of hardware keyloggers. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 26\u201347. Springer, Cham (2015). doi:10.1007\/978-3-319-26362-5_2"},{"key":"20_CR8","unstructured":"Bluetooth SIG, Inc. Bluetooth. https:\/\/www.bluetooth.com. Accessed 28 Jan 2017"},{"key":"20_CR9","unstructured":"IEEE. In: IEEE-SA -IEEE Get 802 Program - 802.11: Wireless LANs. http:\/\/standards.ieee.org\/about\/get\/802\/802.11.html. Accessed 28 Jan 2017"},{"key":"20_CR10","unstructured":"Bluetooth SIG, Inc. How it Works. Bluetooth Technology Website. https:\/\/www.bluetooth.com\/what-is-bluetooth-technology\/how-it-works. Accessed 2017"},{"key":"20_CR11","unstructured":"WiFi Alliance. WiFi Certified Miracast. http:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-certified-miracast. Accessed 28 Jan 2017"},{"key":"20_CR12","unstructured":"WiFi Alliance. WiFi Certified ac. http:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-certified-ac. Accessed 28 Jan 2017"},{"key":"20_CR13","unstructured":"Alfaiate, J., Fonseca, J.: Bluetooth security analysis for mobile phones. In: 7th Iberian Conference on Information Systems and Technologies (CISTI 2012), Madrid, pp. 1\u20136 (2012)"},{"key":"20_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40646-1","volume-title":"Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures","author":"K Haataja","year":"2013","unstructured":"Haataja, K., Hypp\u00f6nen, K., Pasanen, S., Toivanen, P.: Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures. Springer, Berlin (2013)"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-642-54525-2_44","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security: Proceedings of the Second International Conference, SNDS 2014, Trivandrum, India, 13\u201314 March 2014","author":"M Khasawneh","year":"2014","unstructured":"Khasawneh, M., Kajman, I., Alkhudaidy, R., Althubyani, A.: A survey on Wi-Fi protocols: WPA and WPA2. In: Mart\u00ednez, P., Thampi, S., Ko, R., Shu, L. (eds.) Recent Trends in Computer Networks and Distributed Systems Security: Proceedings of the Second International Conference, SNDS 2014, Trivandrum, India, 13\u201314 March 2014, pp. 496\u2013511. Springer, Berlin, Heidelberg (2014)"},{"key":"20_CR16","unstructured":"Ts, J.: X window system administration. Linux J. 1998 (1998)"},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/4236.656066","volume":"2","author":"T Richardson","year":"1998","unstructured":"Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Comput. 2(1), 33\u201338 (1998)","journal-title":"IEEE Internet Comput."},{"key":"20_CR18","unstructured":"Citrix. In: Citrix. http:\/\/www.citrix.com. Accessed 29 Jan 2017"},{"key":"20_CR19","unstructured":"Microsoft Corporation. Microsoft Remote Desktop Clients. https:\/\/technet.microsoft.com\/en-us\/library\/dn473009(v=ws.11).aspx. Accessed 29 Jan 2017"},{"key":"20_CR20","unstructured":"International Telecomunications Union. T.128: Multipoint Application Sharing. https:\/\/www.itu.int\/rec\/T-REC-T.128-200806-I\/en. Accessed 2 Feb 2017"},{"key":"20_CR21","unstructured":"Trusted Computing Group. TPM Main Specification. https:\/\/trustedcomputinggroup.org\/tpm-main-specification\/. Accessed 2 Feb 2017"},{"key":"20_CR22","unstructured":"International Standards Organization: Information Technology \u2013 Telecommunications and Information Exchange Between Systems \u2013 Near Field Communication \u2013 Interface and Protocol (NFCIP-1) ISO\/IEC 18092:2013 (2013)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:56:51Z","timestamp":1625104611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}