{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:34:16Z","timestamp":1742942056818,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_1","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T18:48:21Z","timestamp":1309114101000},"page":"3-12","source":"Crossref","is-referenced-by-count":4,"title":["Visual Programming of Location-Based Services"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Bottaro","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Marino","sequence":"additional","affiliation":[]},{"given":"Franco","family":"Milicchio","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Paoluzzi","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Rosina","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Spini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/1060745.1060768","volume-title":"WWW 2005: Proceedings of the 14th International Conference on World Wide Web","author":"V. Agarwal","year":"2005","unstructured":"Agarwal, V., Dasgupta, K., Karnik, N., Kumar, A., Kundu, A., Mittal, S., Srivastava, B.: A service creation environment based on end to end composition of web services. In: WWW 2005: Proceedings of the 14th International Conference on World Wide Web, pp. 128\u2013137. ACM, New York (2005)"},{"key":"1_CR2","unstructured":"Allen, C., et al.: The transport layer security (TLS) protocol. RFC 5246 (August 2008)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-74974-5_8","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"F. Curbera","year":"2007","unstructured":"Curbera, F., Duftler, M., Khalaf, R., Lovell, D.: Bite: Workflow composition for the web. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol.\u00a04749, pp. 94\u2013106. Springer, Heidelberg (2007)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935230_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"C. Canni\u00e8re De","year":"2006","unstructured":"De Canni\u00e8re, C., Rechberger, C.: Finding SHA-1 characteristics: General results and applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Eastlake, D.E., Hansen, T.: US secure hash algorithms (SHA and HMAC-SHA). RFC 4634 (July 2006)","DOI":"10.17487\/rfc4634"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake, D.E., Jones, P.E.: US secure hash algorithm 1 (SHA1). RFC 3174, Visual Programming of Location-Based Services 11 (September 2001)","DOI":"10.17487\/rfc3174"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-642-05250-7_37","volume-title":"Web Information Systems and Mining","author":"M. Gao","year":"2009","unstructured":"Gao, M., Wu, Z.: EPN-based web service composition approach. In: Liu, W., Luo, X., Wang, F.L., Lei, J. (eds.) WISM 2009. LNCS, vol.\u00a05854, pp. 345\u2013354. Springer, Heidelberg (2009)"},{"key":"1_CR8","unstructured":"Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Western European Workshop on Research in Cryptology (2005)"},{"issue":"1-4","key":"1_CR9","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1080\/16864360.2005.10738390","volume":"2","author":"F. Milicchio","year":"2005","unstructured":"Milicchio, F., Bertoli, C., Paoluzzi, A.: A visual approach to geometric programming. Computer-Aided Design and Applications\u00a02(1-4), 411\u2013421 (2005)","journal-title":"Computer-Aided Design and Applications"},{"issue":"9","key":"1_CR10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u00f3, T.: Kerberos: An authentication service for computer networks. IEEE Communications\u00a032(9) (1994)","journal-title":"IEEE Communications Magazine"},{"key":"1_CR11","unstructured":"IEEE. IEEE standards interpretations for IEEE standard portable operating system interface for computer environments. IEEE 1003.1-1988\/INT (1992)"},{"key":"1_CR12","volume-title":"Network Security Essentials, Applications and Standards","author":"W. Stallings","year":"2000","unstructured":"Stallings, W.: Network Security Essentials, Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)"},{"key":"1_CR13","unstructured":"Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: USENIX Workshop on Electronic Commerce (1996)"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T21:36:46Z","timestamp":1637962606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}