{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:58:47Z","timestamp":1725577127491},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642183539"},{"type":"electronic","value":"9783642183546"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18354-6_8","type":"book-chapter","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T04:25:11Z","timestamp":1296707111000},"page":"46-56","source":"Crossref","is-referenced-by-count":1,"title":["Research and Application of Data Security for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Xiandi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhongqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kaiyi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"8_CR1","first-page":"99","volume":"22","author":"J. Geng","year":"2005","unstructured":"Geng, J., Lu, S.: Safe Data Exchange Based on XML Encryption. Computer Applications and Software\u00a022(2), 99\u2013101 (2005)","journal-title":"Computer Applications and Software"},{"issue":"20","key":"8_CR2","first-page":"5180","volume":"29","author":"K. Che","year":"2008","unstructured":"Che, K., Niu, X., Xing, S.: Research and implementation of encryption method based on XML. Computer Engineering and Design\u00a029(20), 5180\u20135183 (2008)","journal-title":"Computer Engineering and Design"},{"key":"8_CR3","first-page":"471","volume-title":"Cryptography and Network Security","author":"B.A. Forouzan","year":"2009","unstructured":"Forouzan, B.A.: Cryptography and Network Security, pp. 471\u2013506. Tsinghua University Press, Beijing (2009)"},{"key":"8_CR4","unstructured":"Liu, Q.: The Research and Design of Network security system based on SSL protocol.Shandong University (2009)"},{"key":"8_CR5","unstructured":"Canxianjv: SSL protocol and its application in the realization of mobile terminals.University of ELectronic Science and Technology of China (2008)"},{"issue":"3","key":"8_CR6","first-page":"61","volume":"13","author":"B. Zhizhong","year":"2006","unstructured":"Zhizhong, B., Yunqian, L., Jingbo, X.: Security realization of embedded Web Server based on SSL. Electronics Opitics & Control\u00a013(3), 61\u201363 (2006)","journal-title":"Electronics Opitics & Control"},{"issue":"4","key":"8_CR7","first-page":"182","volume":"36","author":"R. Xiaowei","year":"2009","unstructured":"Xiaowei, R., Jiang, D.: Study & Implementation of SSL Protocol\u2019s Security. Computer Science\u00a036(4), 182\u2013184 (2009)","journal-title":"Computer Science"},{"issue":"11-2","key":"8_CR8","first-page":"33","volume":"21","author":"L. Yunqian","year":"2005","unstructured":"Yunqian, L., Jingbo, X., Xizhen, Z.: The Realization of SSL in the Embedded System Based on MatrixSSL. Microcomputer Information\u00a021(11-2), 33\u201335 (2005)","journal-title":"Microcomputer Information"},{"issue":"1","key":"8_CR9","first-page":"217","volume":"16","author":"Z. Xiaoming","year":"2006","unstructured":"Xiaoming, Z., Zelin, W., Jiande, L.: Design and Implementation of Embedded Network Secure Communication Based on OpenSSL. Computer Technology and Development\u00a016(1), 217\u2013220 (2006)","journal-title":"Computer Technology and Development"},{"key":"8_CR10","unstructured":"http:\/\/msdn.microsoft.com\/zh-cn\/library\/ms229746\n                  \n                  \n                 (VS.90).aspx (July 2007)"},{"key":"8_CR11","unstructured":"http:\/\/axtls.sourceforge.net\/dox\/index.html.aspx\n                  \n                  \n                 (2007)"},{"key":"8_CR12","unstructured":"http:\/\/publib.boulder.ibm.com\/infocenter\/wmqv6\/v6r0\/index.jsp?topic=\/com.ibm.mq.csqzas.doc\/sy10660_.htm"},{"key":"8_CR13","unstructured":"http:\/\/www.mozilla.org\/projects\/security\/pki\/nss\/ssl\/draft302.txt"},{"key":"8_CR14","unstructured":"http:\/\/www.cryptoheaven.com\/Security\/Presentation\/SSL-protocol.htm"}],"container-title":["IFIP Advances in Information and Communication Technology","Computer and Computing Technologies in Agriculture IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18354-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T13:56:57Z","timestamp":1558360617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18354-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642183539","9783642183546"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18354-6_8","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}