{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:45:34Z","timestamp":1743021934490,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":16,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658003326"},{"type":"electronic","value":"9783658003333"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-658-00333-3_15","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T06:34:49Z","timestamp":1355121289000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security of Mobile Devices, Applications and Transactions"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Borleteau","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Bousquet","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Crespo","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Dubarry","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Eichholz","sequence":"additional","affiliation":[]},{"given":"Virginie","family":"Galindo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"15_CR62","unstructured":"[CC] Common Criteria http:\/\/www.commoncriteriaportal.org\/cc\/"},{"key":"15_CR63","unstructured":"[COMEC] Action plan on eCommerce \u201eA coherent framework to build trust in the Digital single market for e-commerce and online services\u201c, COM(2011)942 of 11 January 2012"},{"key":"15_CR64","unstructured":"[COMEM] Green Paper \u201cTowards an integrated European market for card, internet and mobile payments\u201d, COM(2011)941 of 11 January 2012"},{"key":"15_CR65","unstructured":"[COMPI] Proposal for a Regulation on the protection of individuals with regard to the processing of personal data and on the free move-ment of such data, COM(2012)11 of 25 January 2012"},{"key":"15_CR66","unstructured":"[COMPR] Communication on \u201cSafeguarding Privacy in a Connected World A European Data Protection Framework for the 21st Century\u201d, COM(2012)9 of 25 January 2012"},{"key":"15_CR67","unstructured":"[EMVCo] EMVCo http:\/\/www.emvco.com\/default.aspx"},{"key":"15_CR68","unstructured":"[ESDR] Eurosmart Digital Security Reference Paper available on www.eurosmart.com"},{"key":"15_CR69","unstructured":"[FIPS] FIPS 140-2 security requirements http:\/\/www.nist.gov\/itl\/upload\/fips1402.pdf"},{"key":"15_CR70","unstructured":"[GP] GlobalPlatform http:\/\/www.globalplatform.org\/"},{"key":"15_CR71","unstructured":"[GPCC] GlobalPlatform Card Composition Model v1.0 under http:\/\/www.globalplatform.org\/specificationscard.asp"},{"key":"15_CR72","unstructured":"[GPTEE] GlobalPlatform TEE System Architecture v1.0 http:\/\/www.globalplatform.org\/sp25x-19g57\/g953-ff472.asp"},{"key":"15_CR73","unstructured":"[JMTR] Juniper Malicious Mobile Threats Report 2010\/2011"},{"key":"15_CR74","unstructured":"[MTCG] Mobile in Trusted Computing Group http:\/\/www.trustedcomputinggroup.org\/developers\/mobile"},{"key":"15_CR75","unstructured":"[SEEK] Seek for android http:\/\/code.google.com\/p\/seek-for-android\/"},{"key":"15_CR76","unstructured":"[SIMA] SIMAlliance http:\/\/www.simalliance.org\/"},{"key":"15_CR77","unstructured":"[TCG] Trusted Computing Group http:\/\/www.trustedcomputinggroup.org\/"}],"container-title":["ISSE 2012 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-00333-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T06:04:27Z","timestamp":1674194667000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-00333-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783658003326","9783658003333"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-00333-3_15","relation":{},"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}