{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:05:45Z","timestamp":1725638745820},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642271410"},{"type":"electronic","value":"9783642271427"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27142-7_41","type":"book-chapter","created":{"date-parts":[[2011,12,3]],"date-time":"2011-12-03T10:31:32Z","timestamp":1322908292000},"page":"353-360","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced Code-Signing Scheme for Smartphone Applications"],"prefix":"10.1007","author":[{"given":"Inkyung","family":"Jeun","sequence":"first","affiliation":[]},{"given":"Kwangwoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Ballagas, R., et al.: The smart phone: a ubiquitous input device. IEEE Pervasive Computing (2006)","DOI":"10.1109\/MPRV.2006.18"},{"key":"41_CR2","unstructured":"Mobile Threats, https:\/\/www.mylookout.com"},{"key":"41_CR3","unstructured":"The Korea Times, Personal info of 35 mil. Nate, Cyworld users feared leaked (July 28, 2011)"},{"key":"41_CR4","unstructured":"Raor, L.: Lookout Identifies Which iPhone And Android Apps Want Your Sensitive Data (July 27, 2010), http:\/\/techcrunch.com"},{"key":"41_CR5","unstructured":"Guo, C., Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: HotNets III (November 2004)"},{"key":"41_CR6","unstructured":"Mulliner, C.R.: Security of Smart Phone, Master\u2019s Thesis of University of California (June 2006)"},{"key":"41_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-21793-7_35","volume-title":"Human Interface and the Management of Information. Interacting with Information","author":"W. Jeon","year":"2011","unstructured":"Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol.\u00a06771, pp. 311\u2013320. Springer, Heidelberg (2011)"},{"key":"41_CR8","unstructured":"http:\/\/developer.symbian.org"},{"key":"41_CR9","unstructured":"http:\/\/seriot.ch\/resources\/talkspapers\/iPhonePrivacy.pdf"},{"key":"41_CR10","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State of the Art Review of Security Mechanisms, arXiv 2009 (November 2009)"},{"key":"41_CR11","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State-of-the-Art Review of Security Mechanisms, http:\/\/arxiv.org\/ftp\/arxiv\/papers\/0912\/0912.5101.pdf"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (April 2002)","DOI":"10.17487\/rfc3280"},{"key":"41_CR13","unstructured":"An RSA Laboratories Technical note, PKCS7 : Cryptographic Message Syntax Standard (November 1, 1993)"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27142-7_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T03:17:16Z","timestamp":1561000636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27142-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642271410","9783642271427"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27142-7_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}