{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:36:11Z","timestamp":1725896171724},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291531"},{"type":"electronic","value":"9783642291548"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29154-8_1","type":"book-chapter","created":{"date-parts":[[2012,4,21]],"date-time":"2012-04-21T03:18:00Z","timestamp":1334978280000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Safe Execution of Dynamically Loaded Code on Mobile Phones"],"prefix":"10.1007","author":[{"given":"Glen","family":"Pink","sequence":"first","affiliation":[]},{"given":"Simon","family":"Gerber","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Fry","sequence":"additional","affiliation":[]},{"given":"Judy","family":"Kay","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Kummerfeld","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Wasinger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","first-page":"1","volume-title":"Mobiquitous 2008","author":"I. Armac","year":"2008","unstructured":"Armac, I., Rose, D.: Privacy-friendly user modelling for smart environments. In: Mobiquitous 2008, pp. 1\u20136. ICST, Brussels (2008)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Chen, T., Peikari, C.: Malicious Software in Mobile Devices. In: Handbook of Research on Wireless Security, p. 1 (2008)","DOI":"10.4018\/978-1-59904-899-4.ch001"},{"key":"1_CR3","volume-title":"MobiQuitous","author":"C. Cottrill","year":"2008","unstructured":"Cottrill, C., Thakuriah, P.: GPS use by households: early indicators of privacy preferences regarding ubiquitous mobility information access. In: Cahill, V. (ed.) MobiQuitous. ACM, New York (2008)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-13470-8_12","volume-title":"User Modeling, Adaptation and Personalization (UMAP)","author":"S. Gerber","year":"2010","unstructured":"Gerber, S., Fry, M., Kay, J., Kummerfeld, B., Pink, G., Wasinger, R.: PersonisJ: Mobile, Client-Side User Modelling. In: User Modeling, Adaptation and Personalization (UMAP), pp. 111\u2013122. Springer, Heidelberg (2010)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-540-72079-9_16","volume-title":"The Adaptive Web","author":"A. Goy","year":"2007","unstructured":"Goy, A., Ardissono, L., Petrone, G.: Personalization in e-commerce applications. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol.\u00a04321, pp. 485\u2013520. Springer, Heidelberg (2007)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Korpipaa, P., Malm, E., Rantakokko, T., Kyllonen, V., Kela, J., Mantyjarvi, J., Hakkila, J., Kansala, I.: Customizing user interaction in smart phones. IEEE Pervasive Computing, 82\u201390 (2006)","DOI":"10.1109\/MPRV.2006.49"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00779-005-0044-5","volume":"10","author":"S. Kurkovsky","year":"2006","unstructured":"Kurkovsky, S., Harihar, K.: Using ubiquitous computing in interactive mobile marketing. Personal and Ubiquitous Computing\u00a010(4), 227\u2013240 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1-2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s11416-005-0005-6","volume":"1","author":"D. Reynaud-Plantey","year":"2005","unstructured":"Reynaud-Plantey, D.: New threats of Java viruses. Journal in Computer Virology\u00a01(1-2), 32\u201343 (2005)","journal-title":"Journal in Computer Virology"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11416-006-0014-0","volume":"2","author":"D. Reynaud-Plantey","year":"2006","unstructured":"Reynaud-Plantey, D.: The Java Mobile Risk. Journal in Computer Virology\u00a02(2), 101\u2013107 (2006)","journal-title":"Journal in Computer Virology"},{"issue":"9","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11416-006-0022-0","volume":"2","author":"S. T\u00f6yssy","year":"2006","unstructured":"T\u00f6yssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology\u00a02(2), 109\u2013119 (2006)","journal-title":"Journal in Computer Virology"},{"key":"1_CR12","first-page":"117","volume-title":"MindTrek 2008","author":"S. Uhlmann","year":"2008","unstructured":"Uhlmann, S., Lugmayr, A.: Personalization algorithms for portable personality. In: MindTrek 2008, pp. 117\u2013121. ACM, New York (2008)"},{"key":"1_CR13","unstructured":"Union, I.T.: Measuring the Information Society 2010. International Telecommunication Union (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29154-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T11:08:01Z","timestamp":1556708881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29154-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291531","9783642291548"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29154-8_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}