{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:26:37Z","timestamp":1725751597681},"publisher-location":"Wiesbaden","reference-count":5,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658033705"},{"type":"electronic","value":"9783658033712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-658-03371-2_23","type":"book-chapter","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T17:51:48Z","timestamp":1381513908000},"page":"263-273","source":"Crossref","is-referenced-by-count":0,"title":["Secure Mobile Government and Mobile Banking Systems Based on Android Clients"],"prefix":"10.1007","author":[{"given":"Milan","family":"Markovi\u0107","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Goran","family":"\u0110or\u0111evi\u0107","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Markovi\u0107, M., \u0110or\u0111evi\u0107, G.: \u041en Secure m-government and m-banking model. In Proc of 6th\nInternational Conference on Methodologies, Technologies and Tools Enabling e-Government.\nBelgrade, Serbia, July 3 \u2013 5, 2012. pp. 100-111."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Markovi\u0107, M., \u0110or\u0111evi\u0107, G.: On Possible Model of Secure e\/m-Government System. Information\nSystems Management. Taylor & Francis Group, LLC. 2010. 27:320-333,.","DOI":"10.1080\/10580530.2010.514188"},{"key":"23_CR3","unstructured":"Markovi\u0107, M., \u0110or\u0111evi\u0107, G.: On Secure SOA-Based e\/m-Government Online Services. In Handbook\n\u201cService Delivery Platforms: Developing and Deploying Converged Multimedia Services\u201d.\nTaylor & Francis, 2011, p. 251 \u2013 278, Chapter 11."},{"key":"23_CR4","unstructured":"Markovi\u0107, M., \u0110or\u0111evi\u0107, G.: On Possible Secure Cross-Border M-Government Model. In: Proceedings\nof the 5th International Conference on Methodologies, Technologies and Tools Enabling\ne-Government, Camerino, Italy, June 30th \u2013 July 1st. 2011. pp. 381 \u2013 394."},{"issue":"4","key":"23_CR5","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/j.comcom.2006.10.014","volume":"30","author":"Y. Lee","year":"2007","unstructured":"Lee, Y., Lee, J., Song, J.: Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Computer Communication. 2007. 30 (4): 893-903.","journal-title":"Computer Communication"}],"container-title":["ISSE 2013 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-03371-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T21:13:39Z","timestamp":1558127619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-658-03371-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783658033705","9783658033712"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-03371-2_23","relation":{},"subject":[],"published":{"date-parts":[[2013]]}}}