{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:06Z","timestamp":1725906426616},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644738"},{"type":"electronic","value":"9783319644745"}],"license":[{"start":{"date-parts":[[2017,7,29]],"date-time":"2017-07-29T00:00:00Z","timestamp":1501286400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-64474-5_35","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T14:30:11Z","timestamp":1501252211000},"page":"412-419","source":"Crossref","is-referenced-by-count":3,"title":["Security of Mobile Banking Applications"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Szczepanik","sequence":"first","affiliation":[]},{"given":"Ireneusz","family":"J\u00f3\u017awiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Posegga, J., Schreckling, D.: Next generation mobile application security. In: IT-Sicherheit zwischen Regulierung und Innovation: Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit, pp. 181\u2013199 (2011)","DOI":"10.1007\/978-3-8348-8256-1_10"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Tin, Y.S.T., Vasanta, H., Boyd, C., Nieto, J.M.G.: Protocols with security proofs for mobile applications. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) Information Security and Privacy. ACISP 2004. Lecture Notes in Computer Science, vol. 3108. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-27800-9_31"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, X., Yang, F., Liu, Z., Wang, Z., Wang, K.: Research and application of data security for mobile devices. In: Li, D., Liu, Y., Chen, Y. (eds.) Computer and Computing Technologies in Agriculture IV. CCTA 2010. IFIP Advances in Information and Communication Technology, vol. 346. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-18354-6_8"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Cimler, R., Matyska, J., Balk, L., Horalek, J., Sobeslav, V.: Security issues of mobile application using cloud computing. In: Abraham, A., Kr\u00f6mer, P., Snasel, V. (eds.) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol. 334. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-13572-4_29"},{"key":"35_CR5","unstructured":"2016 Mobile Security Report, \nhttps:\/\/info.nowsecure.com\/2016-mobile-security-report.html\n\n, Accessed 10 Mar 2017"},{"key":"35_CR6","unstructured":"Gartner Magic Quadrant for Application Security Testing (2017). \nhttps:\/\/info.veracode.com\/analyst-report-gartner-mq-appsec-testing-2017.html\n\n, Accessed 10 Mar 2017"},{"key":"35_CR7","unstructured":"The State of Mobile Web in the US (2015), \nhttps:\/\/www.similarweb.com\/corp\/the-state-of-mobile-web-in-the-us-2015\/\n\n, Accessed 10 Mar 2017"},{"key":"35_CR8","unstructured":"OWASP, \nhttps:\/\/www.owasp.org\n\n, Accessed 10 Mar 2017"},{"key":"35_CR9","unstructured":"Drozer, \nhttps:\/\/labs.mwrinfosecurity.com\n\n, Accessed 10 Mar 2017"},{"key":"35_CR10","unstructured":"Ostorlab, \nhttps:\/\/www.ostorlab.co\n\n, Accessed 10 Mar 2017"},{"key":"35_CR11","unstructured":"Appvigil, \nhttps:\/\/www.appvigil.co\n\n, Accessed 10 Mar 2017"},{"key":"35_CR12","unstructured":"Quixxi, \nhttps:\/\/www.quixxi.com\n\n, Accessed 10 Mar 2017"},{"key":"35_CR13","unstructured":"AndroTotal, \nhttp:\/\/andrototal.org\n\n, Accessed 10 Mar 2017"},{"key":"35_CR14","unstructured":"MobiSecLab Acana, \nhttp:\/\/www.mobiseclab.org\/akana\/Intro.html\n\n, Accessed 05 Mar 2017"},{"key":"35_CR15","unstructured":"Veracode, \nhttps:\/\/www.veracode.com\/\n\n, Accessed 05 Mar 2017"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Solutions in Diagnostics and Fault Tolerant Control"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64474-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T14:41:55Z","timestamp":1501252915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64474-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,29]]},"ISBN":["9783319644738","9783319644745"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64474-5_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,29]]}}}