{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:23:46Z","timestamp":1741667026015,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642237768"},{"type":"electronic","value":"9783642237775"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23777-5_21","type":"book-chapter","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T16:45:56Z","timestamp":1315845956000},"page":"125-130","source":"Crossref","is-referenced-by-count":0,"title":["Research on Mobile Electronically Published Materials Protection"],"prefix":"10.1007","author":[{"given":"Sha","family":"Shi","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Mingzhu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","first-page":"1","volume":"1","author":"P. Papadimitriou","year":"2010","unstructured":"Papadimitriou, P., Garcia-Molina, H.: Data Leakage Detection. IEEE Transactions on Knowledge and Data Engineering\u00a01, P1\u20131 (2010)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"21_CR2","unstructured":"Wikipedia. Data Loss Prevention (2009), http:\/\/en.wikipedia.org\/wiki\/datalossprevention"},{"key":"21_CR3","unstructured":"Yoshihama, S., Mishina, T., Matsumoto, T.: Web-based Data Leakage Prevention"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Borders, K., Prakash, A.: Quantifying information leaks in outbound web trace. In: IEEE Symposium on Security & Privacy (2009)","DOI":"10.1109\/SP.2009.9"},{"key":"21_CR5","unstructured":"Microsoft Technet. Protecting Data by Using EFS to Encrypt Hard Drive (EB\/0L), http:\/\/www.microsoft.com\/technet\/security\/smallbusiness\/topics\/cryptographyetc\/protext_data_efs.mspx"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/JSAC.2007.070120","volume":"25","author":"C.-M. Huang","year":"2007","unstructured":"Huang, C.-M., Hsu, T.-H., Hsu, M.-F.: Network-aware P2P File Sharing over the Wireless Mobile Networks. IEEE Journal On Selected Areas In Communications\u00a025(1), 204\u2013210 (2007)","journal-title":"IEEE Journal On Selected Areas In Communications"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Claudio, E., Bujari, P.A., Cervi, E.: P2P File Sharing on Mobile Phones: Design and Implentation of a Prototype. IEEE, 136\u2013140 (2009)","DOI":"10.1109\/ICCSIT.2009.5234836"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Noponen, S., Karppinen, K.: Information Security of Remote File Transfers with Mobile Devices. In: Annual IEEE International Computer Software and Applications Conference, pp. 973\u2013978 (2008)","DOI":"10.1109\/COMPSAC.2008.128"},{"key":"21_CR9","volume-title":"Information Security Principles","author":"M.E. Whitman","year":"2006","unstructured":"Whitman, M.E., Mattord, H.J.: Information Security Principles. Tsinghua University Press, Beijing (2006)"},{"key":"21_CR10","unstructured":"Japan Network Security Association. Information Security Incident Survey Report ver.1.0, http:\/\/www.jnsa.org\/result\/index.html"}],"container-title":["Advances in Intelligent and Soft Computing","Advances in Computer Science, Intelligent System and Environment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23777-5_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:35:25Z","timestamp":1741624525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23777-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642237768","9783642237775"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23777-5_21","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2011]]}}}