{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:36:46Z","timestamp":1725525406382},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004124"},{"type":"electronic","value":"9783642004131"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-642-00413-1_10","type":"book-chapter","created":{"date-parts":[[2009,2,13]],"date-time":"2009-02-13T12:01:15Z","timestamp":1234526475000},"page":"82-89","source":"Crossref","is-referenced-by-count":9,"title":["Device Data Protection in Mobile Healthcare Applications"],"prefix":"10.1007","author":[{"given":"Dasun","family":"Weerasinghe","sequence":"first","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Veselin","family":"Rakocevic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.istr.2005.02.001","volume":"10","author":"K. Beznosova","year":"2005","unstructured":"Beznosova, K., Flinnb, D.J., Kawamotoc, S., Hartmand, B.: Introduction to web services and their security. Information Security Technical Report\u00a010(1), 2\u201314 (2005)","journal-title":"Information Security Technical Report"},{"issue":"5","key":"10_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1049\/ecej:20020504","volume":"14","author":"N. Borselius","year":"2002","unstructured":"Borselius, N.: Mobile agent security. Electronics & Communication Engineering Journal\u00a014(5), 211\u2013218 (2002)","journal-title":"Electronics & Communication Engineering Journal"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/764792.764806","volume-title":"XMLSEC 2002: Proceedings of the 2002 ACM workshop on XML security","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Towards securing xml web services. In: XMLSEC 2002: Proceedings of the 2002 ACM workshop on XML security, pp. 90\u201396. ACM, New York (2002)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/SECPRI.1996.502681","volume-title":"1996 IEEE Symposium on Security and Privacy","author":"D. Dean","year":"1996","unstructured":"Dean, D., Felten, E.W., Wallach, D.S.: Java security: from HotJava to Netscape and beyond. In: IEEE (ed.) 1996 IEEE Symposium on Security and Privacy, Oakland, California, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, May 6-8, 1996, pp. 190\u2013200. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1504\/IJEH.2007.013104","volume":"3","author":"A. Dwivedi","year":"2007","unstructured":"Dwivedi, A., Wickramasinghe, N., Bali, R.K., Naguib, R.N.G., Goldberg, S.: Crit- ical success factors for achieving superior m-health success. International Journal of Electronic Healthcare\u00a03(2), 261\u2013278 (2007)","journal-title":"International Journal of Electronic Healthcare"},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TITB.2004.840019","volume":"8","author":"R.S.H. Istepanian","year":"2004","unstructured":"Istepanian, R.S.H., Jovanov, E., Zhang, Y.T.: Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health- care connectivity. IEEE Transactions on Information Technology in Biomedicine\u00a08(4), 405\u2013414 (2004)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"10_CR7","unstructured":"Hillenbrand, J.M.M., Gotze, J., Mullar, P.: A Single- Sign-On Framework forWeb-Services-based Distributed Applications. In: Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005, vol.\u00a0(1), pp. 273\u2013279 (2005)"},{"issue":"7","key":"10_CR8","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1504\/IJEH.2007.011481","volume":"3","author":"E.B. Moran","year":"2007","unstructured":"Moran, E.B., Tentori, M., Gonzalez, V.M., Favela, J., Martinez-Garcia, A.I.: Mobility in hospital work: towards a pervasive computing hospital environment. Intl. J. Electronic Healthcare\u00a03(7), 72\u201389 (2007)","journal-title":"Intl. J. Electronic Healthcare"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0141-9331(01)00099-0","volume":"25","author":"P. Picco","year":"2001","unstructured":"Picco, P.: Mobile agents: an introduction. Microprocessors and Microsystems\u00a025(2), 65\u201374 (2001)","journal-title":"Microprocessors and Microsystems"},{"key":"10_CR10","unstructured":"Sun Microsystems, Wireless Toolkit, Version 2.1 (2003), \n                    \n                      http:\/\/java.sun.com\/products"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Tardo, J., Valente, L.: Mobile agent security and Telescript. In: IEEE CompCon 1996, pp. 58\u201363 (1996)","DOI":"10.1109\/CMPCON.1996.501749"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1145\/352600.352632","volume-title":"CCS 2000: Proceedings of the 7th ACM conference on Computer and communications security","author":"V. Varadharajan","year":"2000","unstructured":"Varadharajan, V.: Security enhanced mobile agents. In: CCS 2000: Proceedings of the 7th ACM conference on Computer and communications security, pp. 200\u2013209. ACM Press, New York (2000)"},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1504\/IJEH.2007.015320","volume":"3","author":"D. Weerasinghe","year":"2007","unstructured":"Weerasinghe, D., Elmufti, K., Rajarajan, M., Rakocevic, V.: Securing electronic health records with novel mobile encryption schemes. International Journal of Electronic Healthcare\u00a03(4), 395\u2013416 (2007)","journal-title":"International Journal of Electronic Healthcare"},{"issue":"3","key":"10_CR14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.3414\/ME9116","volume":"47","author":"D. Weerasinghe","year":"2008","unstructured":"Weerasinghe, D., Rajarajan, M., Elmufti, K., Rakocevic, V.: Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine\u00a047(3), 235\u2013240 (2008)","journal-title":"Methods of Information in Medicine"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Electronic Healthcare"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00413-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:18:11Z","timestamp":1619777891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00413-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783642004124","9783642004131"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00413-1_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[]}}