{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:14:19Z","timestamp":1742984059428,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":8,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400758599"},{"type":"electronic","value":"9789400758605"}],"license":[{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5860-5_15","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T12:00:32Z","timestamp":1355140832000},"page":"121-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Self-Encryption Scheme for Resource Limited Mobile Devices"],"prefix":"10.1007","author":[{"given":"Yongjoo","family":"Shin","sequence":"first","affiliation":[]},{"given":"Seungjae","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Minsoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Chen Y, Ku WS (2009) Self-encryption scheme for data security in mobile devices. In: IEEE consumer communication and networking conference (CCNC)","DOI":"10.1109\/CCNC.2009.4784733"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Gasti P, Chen Y (2010) Breaking and fixing the self-encryption scheme for data security in mobile devices. In: Proceedings of the 18th Euromicro conference on parallel, distributed and network-based processing (PDP)","DOI":"10.1109\/PDP.2010.13"},{"key":"15_CR3","unstructured":"3GPP Std. TS33.220 v11.3.0 (2012) Generic authentication architecture (GAA); generic bootstrapping architecture (GBA)"},{"key":"15_CR4","unstructured":"Stallings W (2003) Cryptography and network security, 3 edn. Prentice Hall, Philadelphia, pp 43\u201344, 66\u201367, 192\u2013194"},{"key":"15_CR5","unstructured":"Knuth DE (1998) The art of computer programming. Seminumerical algorithms, vol 2. Addison-Weseley"},{"key":"15_CR6","unstructured":"Wilson MC (2005) Overview of sattolo\u2019s algorithm. Technical Report 5542, INRIA"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2007) Introduction to modern cryptography. Chapman and Hall\/CRC, Boca Raton","DOI":"10.1201\/9781420010756"}],"container-title":["Lecture Notes in Electrical Engineering","IT Convergence and Security 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5860-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T09:18:34Z","timestamp":1683796714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5860-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,11]]},"ISBN":["9789400758599","9789400758605"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5860-5_15","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2012,12,11]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}