{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:55:21Z","timestamp":1768586121485,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,3,21]],"date-time":"2013-03-21T00:00:00Z","timestamp":1363824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s10660-013-9112-5","type":"journal-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T10:05:52Z","timestamp":1363773952000},"page":"129-150","source":"Crossref","is-referenced-by-count":32,"title":["Design of trustworthy smartphone-based multimedia services in cultural environments"],"prefix":"10.1007","volume":"13","author":[{"given":"Dimitrios","family":"Koukopoulos","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Styliaras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,21]]},"reference":[{"issue":"4","key":"9112_CR1","first-page":"326","volume":"11","author":"C. Adolphs","year":"2010","unstructured":"Adolphs, C., & Winkelmann, A. (2010). Personalisation research on e-commerce\u2014a state of the art review (2000\u20132008). Journal of Electronic Commerce Research, 11(4), 326\u2013341.","journal-title":"Journal of Electronic Commerce Research"},{"key":"9112_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/1180367.1180379","volume-title":"Proc. of the 3rd ACM workshop on secure web services","author":"B. Al Bouna","year":"2006","unstructured":"Al Bouna, B., & Chbeir, R. (2006). Multimedia-based authorization and access control policy specification. In Proc. of the 3rd ACM workshop on secure web services (pp. 61\u201368)."},{"key":"9112_CR3","doi-asserted-by":"crossref","unstructured":"Arnold, D. (2008). Paster\u2019s quadrant: cultural heritage as inspiration for basic research in computer science. Journal on Computing and Cultural Heritage, 1(1).","DOI":"10.1145\/1367080.1367081"},{"issue":"8","key":"9112_CR4","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/280324.280330","volume":"41","author":"Y. Bakos","year":"1998","unstructured":"Bakos, Y. (1998). The emerging role of electronic marketplaces on the Internet. Communications of the ACM, 41(8), 35\u201342.","journal-title":"Communications of the ACM"},{"key":"9112_CR5","first-page":"152","volume-title":"Proc. of the 3rd European conference on web services","author":"A. Bengtsson","year":"2005","unstructured":"Bengtsson, A., & Westerdahl, L. (2005). Secure choreography of cooperating web services. In Proc. of the 3rd European conference on web services (pp. 152\u2013159)."},{"key":"9112_CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1011512919970","volume":"1","author":"M. Bichler","year":"2001","unstructured":"Bichler, M., Field, S., & Werthner, H. (2001). Introduction: theory and application of electronic market design. Journal of Electronic Commerce Research, 1, 215\u2013220.","journal-title":"Journal of Electronic Commerce Research"},{"key":"9112_CR7","first-page":"77","volume-title":"Proc. of the ID&A interaction design & architecture(s)","author":"A. Celentano","year":"2009","unstructured":"Celentano, A., Orsini, R., Pittarello, F., & Barbieri, G. (2009). Design and evaluation of a mobile art guide on iPod touch. In Proc. of the ID&A interaction design & architecture(s) (Vol. 5\u20136, pp. 77\u201380)."},{"key":"9112_CR8","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1145\/1027527.1027631","volume-title":"Proc. of the 12th annual ACM international conference on multimedia","author":"S. Chen","year":"2004","unstructured":"Chen, S., Shyu, M., & Zhao, N. (2004). SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database. In Proc. of the 12th annual ACM international conference on multimedia (pp. 432\u2013435)."},{"key":"9112_CR9","first-page":"95","volume-title":"Proc. of the 4th international conference AXMEDIS","author":"G. Ciocca","year":"2008","unstructured":"Ciocca, G., Colombo, A., Gagliardi, I., & Schettini, R. (2008). Intangible heritage management and multimodal navigation. In Proc. of the 4th international conference AXMEDIS (pp. 95\u2013102)."},{"key":"9112_CR10","first-page":"410","volume-title":"Proc. of the edutainment","author":"G. Cutr\u00ed","year":"2008","unstructured":"Cutr\u00ed, G., Naccarato, G., & Pantano, E. (2008). Mobile cultural heritage: the case study of locri. In Proc. of the edutainment (pp. 410\u2013420)."},{"key":"9112_CR11","volume-title":"Mobile e-commerce: market strategies","author":"J. Davison","year":"2000","unstructured":"Davison, J., Walsh, A., & Brown, D. (2000). Mobile e-commerce: market strategies. London: Ovum Research Ltd."},{"key":"9112_CR12","first-page":"1143","volume-title":"Proc. of the 10th conference human computer interaction","author":"A. Galani","year":"2003","unstructured":"Galani, A., Chalmers, M., Brown, B., McColl, I., Randell, C., & Steed, A. (2003). Developing a mixed reality co-visiting experience for local and remote museum companions. In Proc. of the 10th conference human computer interaction (pp. 1143\u20131147)."},{"key":"9112_CR13","first-page":"125","volume-title":"Proc. of the 6th international conference MUM","author":"C. Giordano","year":"2007","unstructured":"Giordano, C., Modeo, S., Bernardi, G., & Ricchiuti, F. (2007). Using mobile phones as remote control for ubiquitous video-recording. In Proc. of the 6th international conference MUM (Vol. 284, pp. 125\u2013130))."},{"issue":"10","key":"9112_CR14","doi-asserted-by":"crossref","first-page":"968","DOI":"10.4304\/jnw.4.10.968-975","volume":"4","author":"S. M. Habib","year":"2009","unstructured":"Habib, S. M., Jacob, C., & Olovsson, T. (2009). An analysis of the robustness and stability of the network stack in symbian-based smartphones. Journal of Networks, 4(10), 968\u2013975.","journal-title":"Journal of Networks"},{"issue":"2","key":"9112_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541895.1541899","volume":"7","author":"L. Hjorth","year":"2009","unstructured":"Hjorth, L. (2009). The big bang: an example of mobile media as new media. Computer in Entertainment, 7(2), 1\u201313.","journal-title":"Computer in Entertainment"},{"key":"9112_CR16","doi-asserted-by":"crossref","unstructured":"Housley, R., & Ford, W. (1999). Internet X.509 public key infrastructure certificate and CRL profile. RFC\u00a02459.","DOI":"10.17487\/rfc2459"},{"issue":"3","key":"9112_CR17","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s00799-004-0080-1","volume":"4","author":"N. B. Kodali","year":"2004","unstructured":"Kodali, N. B., Farkas, C., & Wijesekera, D. (2004). An authorization model for multimedia digital libraries. Journal of Digital Libraries, 4(3), 139\u2013155.","journal-title":"Journal of Digital Libraries"},{"issue":"5","key":"9112_CR18","doi-asserted-by":"crossref","first-page":"404","DOI":"10.4304\/jmm.5.5.404-416","volume":"5","author":"D. K. Koukopoulos","year":"2010","unstructured":"Koukopoulos, D. K., & Styliaras, G. D. (2010). Security in collaborative multimedia web-based art projects. Journal of Multimedia, 5(5), 404\u2013416.","journal-title":"Journal of Multimedia"},{"key":"9112_CR19","first-page":"279","volume-title":"Proc. of the IFIP","author":"L. Mostarda","year":"2008","unstructured":"Mostarda, L., Dong, C., & Dulay, N. (2008). Place and time authentication of cultural assets. In Proc. of the IFIP (Vol.\u00a0263, pp. 279\u2013294)."},{"key":"9112_CR20","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-10772-6_25","volume":"5905","author":"R. Mukkamala","year":"2009","unstructured":"Mukkamala, R., Kamisetty, V., & Yedugani, P. (2009). Detecting and resolving misconfigurations in role-based access control. Information Systems Security, 5905, 318\u2013325.","journal-title":"Information Systems Security"},{"key":"9112_CR21","unstructured":"Museum of Modern Art (2013). http:\/\/www.moma.org ."},{"key":"9112_CR22","unstructured":"National Museum of Contemporary Art (2013). http:\/\/www.emst.gr ."},{"key":"9112_CR23","first-page":"43","volume-title":"Proc. of the 11th international workshop mobile computing systems and applications","author":"J. Oberheide","year":"2010","unstructured":"Oberheide, J., & Jahanian, F. (2010). When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In Proc. of the 11th international workshop mobile computing systems and applications (pp. 43\u201348)."},{"issue":"12","key":"9112_CR24","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/1610252.1610287","volume":"52","author":"K. Renaud","year":"2009","unstructured":"Renaud, K., & Angeli, A. (2009). Visual passwords: cure-all or snake-oil. Communications of the ACM, 52(12), 135\u2013140.","journal-title":"Communications of the ACM"},{"key":"9112_CR25","first-page":"131","volume-title":"Proc. of the conference museums and the web","author":"S. Sauer","year":"2003","unstructured":"Sauer, S., & Gobel, S. (2003). Focus your young visitors: kids innovation-fundamental changes in digital edutainment. In Proc. of the conference museums and the web (pp. 131\u2013141)."},{"key":"9112_CR26","first-page":"78","volume-title":"Proc. of the 2nd national conference COIT","author":"A. Sharma","year":"2008","unstructured":"Sharma, A. (2008). Bluetooth security issues: threats and consequences. In Proc. of the 2nd national conference COIT (pp. 78\u201380)."},{"issue":"4","key":"9112_CR27","first-page":"221","volume":"8","author":"R. Sinkovics","year":"2007","unstructured":"Sinkovics, R., Yamin, M., & Hossinger, M. (2007). Cultural adaptation in cross border e-commerce: a study of German companies. Journal of Electronic Commerce Research, 8(4), 221\u2013235.","journal-title":"Journal of Electronic Commerce Research"},{"key":"9112_CR28","volume-title":"Cryptography and network security: principles and practice","author":"W. Stallings","year":"2006","unstructured":"Stallings, W. (2006). Cryptography and network security: principles and practice. New York: Prentice Hall."},{"key":"9112_CR29","doi-asserted-by":"crossref","first-page":"41","DOI":"10.17705\/1CAIS.00803","volume":"8","author":"P. Tarasewich","year":"2002","unstructured":"Tarasewich, P., Nickerson, R. C., & Warkentin, M. (2002). Issues in mobile e-commerce. Communications of the Association for Information Systems, 8, 41\u201364.","journal-title":"Communications of the Association for Information Systems"},{"key":"9112_CR30","volume-title":"International cultural heritage informatics meeting 2003","author":"E. Tsekleves","year":"2003","unstructured":"Tsekleves, E., & Cosmas, J. (2003). Promoting and disseminating cultural heritage sites to people on the move. In International cultural heritage informatics meeting 2003. Archives & Museums Informatics Europe"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9112-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9112-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9112-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T23:02:00Z","timestamp":1644620520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9112-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,21]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["9112"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9112-5","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,21]]}}}