{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:44:05Z","timestamp":1725893045452},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333910"},{"type":"electronic","value":"9783642333927"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33392-7_6","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T00:58:44Z","timestamp":1345424324000},"page":"53-54","source":"Crossref","is-referenced-by-count":0,"title":["Presenting the Brazilian Project TSAM \u2013 Security Technologies for Mobile Environments"],"prefix":"10.1007","author":[{"given":"Alexandre M.","family":"Braga","sequence":"first","affiliation":[]},{"given":"Erick N.","family":"Nascimento","sequence":"additional","affiliation":[]},{"given":"Lucas R.","family":"Palma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"ANATEL \u2013 Ag\u00eancia Nacional de Telecomunica\u00e7\u00f5es, \n                    \n                      http:\/\/www.anatel.gov.br"},{"key":"6_CR2","unstructured":"CERT.br \u2013 Centro de Estudos, Resposta e Tratamento de Incidentes de Seguran\u00e7a no Brasil, \n                    \n                      http:\/\/www.cert.br"},{"key":"6_CR3","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011 (2011)"},{"key":"6_CR4","unstructured":"NSA. Enterprise Mobility Architecture for Secure Voice over Internet Protocol. Mobility Capability Package \u2013 Secure VoIP, Version 1.2"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Grosschadl, J., Page, D.: Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. Cryptology ePrint Archive, Report Nr. 2011\/712 (2011)","DOI":"10.1007\/978-3-642-30955-7_17"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33392-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T23:35:23Z","timestamp":1557185723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33392-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333910","9783642333927"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33392-7_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}