{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T22:15:10Z","timestamp":1683152110726},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,27]],"date-time":"2013-09-27T00:00:00Z","timestamp":1380240000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11036-013-0462-y","type":"journal-article","created":{"date-parts":[[2013,9,26]],"date-time":"2013-09-26T03:27:57Z","timestamp":1380166077000},"page":"64-78","source":"Crossref","is-referenced-by-count":3,"title":["A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms"],"prefix":"10.1007","volume":"19","author":[{"given":"Ana","family":"Nieto","sequence":"first","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,27]]},"reference":[{"issue":"1","key":"462_CR1","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M La Polla","year":"2013","unstructured":"La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. Commun Surv Tutor, IEEE 15(1):446. doi: 10.1109\/SURV.2012.013012.00028","journal-title":"Commun Surv Tutor, IEEE"},{"key":"462_CR2","unstructured":"Hoog A, Strzempka K (2011) IPhone and IOS forensics: investigation analysis and mobile security for apple IPhone, IPad and IOS devices (Syngress)"},{"key":"462_CR3","unstructured":"Delac G, Silic M, Krolo J (2011) Emerging security threats for mobile platforms. In: MIPRO, 2011 Proceedings of the 34th International Convention, pp 1468\u20131473"},{"key":"462_CR4","doi-asserted-by":"crossref","unstructured":"Mohan S, Agarwal N (2011) A convergent framework for QoS-driven social media content delivery over mobile networks. In: Wireless communication, vehicular technology. information theory and aerospace & electronic systems technology (Wireless VITAE), 2011 2nd International Conference on (IEEE), pp 1\u20137","DOI":"10.1109\/WIRELESSVITAE.2011.5940846"},{"key":"462_CR5","doi-asserted-by":"crossref","unstructured":"Lorentzen C, Fiedler M, Johnson H, Shaikh J, Jorstad I (2010) On user perception of web login - a study on QoE in the context of security. In: Telecommunication networks and applications conference (ATNAC), 2010 Australasian, pp 84\u201389. doi: 10.1109\/ATNAC.2010.5680262","DOI":"10.1109\/ATNAC.2010.5680262"},{"issue":"3","key":"462_CR6","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/s11036-010-0223-0","volume":"15","author":"K De Moor","year":"2010","unstructured":"De Moor K, Ketyko I, Joseph W, Deryckere T, De Marez L, Martens L, Verleye G (2010) Proposed framework for evaluating quality of experience in a mobile, testbed-oriented living lab setting. Mob Netw Appl 15(3):378","journal-title":"Mob Netw Appl"},{"key":"462_CR7","doi-asserted-by":"crossref","unstructured":"Nieto A, Lopez J (2012) Security and QoS relationships in mobile platforms. In: Computer science and its applications. Springer, pp 13\u201321","DOI":"10.1007\/978-94-007-5699-1_2"},{"issue":"1","key":"462_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N Clarke","year":"2007","unstructured":"Clarke N, Furnell S (2007) Authenticating mobile phone users using keystroke analysis. Int J Inf Secur 6(1):1. doi: 10.1007\/s10207-006-0006-6","journal-title":"Int J Inf Secur"},{"key":"462_CR9","doi-asserted-by":"crossref","unstructured":"Anastasi G, Conti M, Gregori E, Passarella A (2003) Balancing energy saving and QoS in the mobile internet: an application-independent approach. In: System sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on (IEEE), 10\u2013pp","DOI":"10.1109\/HICSS.2003.1174855"},{"key":"462_CR10","doi-asserted-by":"crossref","unstructured":"Bellasi P, Bosisio S, Carnevali M, Fornaciari W, Siorpaes D (2010) Constrained power management: application to a multimedia mobile platform. In: Design, automation test in Europe conference exhibition (DATE), 2010, pp 989\u2013992","DOI":"10.1109\/DATE.2010.5456905"},{"key":"462_CR11","doi-asserted-by":"crossref","unstructured":"Kao YW, Luo GH, Lin HT, Huang YK, Yuan SM (2011) Physical access control based on QR code. In: Cyber-enabled distributed computing and knowledge discovery (CyberC), 2011 International Conference on, pp 285\u2013288. doi: 10.1109\/CyberC.2011.55","DOI":"10.1109\/CyberC.2011.55"},{"key":"462_CR12","doi-asserted-by":"crossref","unstructured":"Kieseberg P, Leithner M, Mulazzani M, Munroe L, Schrittwieser S, Sinha M, Weippl E (2010) QR code security. In: Proceedings of the 8th international conference on advances in mobile computing and multimedia. ACM, New York, NY, USA, MoMM \u201910, pp 430\u2013435. http:\/\/doi.acm.org\/10.1145\/1971519.1971593","DOI":"10.1145\/1971519.1971593"},{"key":"462_CR13","doi-asserted-by":"crossref","unstructured":"Cheon WB, il Heo K, Lim WG, Park WH, Chung TM (2011) The new vulnerability of service set identifier (SSID) using QR code in android phone. In: Information science and applications (ICISA), 2011 International Conference on, pp 1\u20136. doi: 10.1109\/ICISA.2011.5772367","DOI":"10.1109\/ICISA.2011.5772367"},{"key":"462_CR14","unstructured":"Damme GV, Wouters K (2009) Practical experiences with NFC security on mobile phones. Katholieke Universiteit Leiden"},{"key":"462_CR15","doi-asserted-by":"crossref","unstructured":"Madlmayr G, Langer J, Kantner C, Scharinger J (2008) NFC devices: security and privacy. In: Availability, reliability and security, 2008. ARES 08. Third International Conference on, pp 642\u2013647. doi: 10.1109\/ARES.2008.105","DOI":"10.1109\/ARES.2008.105"},{"key":"462_CR16","doi-asserted-by":"crossref","unstructured":"Mulliner C (2009) Vulnerability analysis and attacks on NFC-enabled mobile phones. In: Availability, reliability and security, 2009. ARES \u201909. International Conference on, pp 695\u2013700. doi: 10.1109\/ARES.2009.46","DOI":"10.1109\/ARES.2009.46"},{"key":"462_CR17","doi-asserted-by":"crossref","unstructured":"Verdult R, Kooman F (2011) Practical attacks on NFC enabled cell phones. In: Near field communication (NFC), 2011 3rd International Workshop on (IEEE), pp 77\u201382","DOI":"10.1109\/NFC.2011.16"},{"key":"462_CR18","doi-asserted-by":"crossref","unstructured":"Roland M, Langer J, Scharinger J (2011) Security vulnerabilities of the NDEF signature record type. In: Near field communication (NFC), 2011 3rd International Workshop on, pp 65\u201370. doi: 10.1109\/NFC.2011.9","DOI":"10.1109\/NFC.2011.9"},{"key":"462_CR19","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10207-011-0144-3","volume":"10","author":"W Glisson","year":"2011","unstructured":"Glisson W, Storer T, Mayall G, Moug I, Grispos G (2011) Electronic retention: what does your mobile phone reveal about you?Int J Inf Secur 10:337. doi: 10.1007\/s10207-011-0144-3","journal-title":"Int J Inf Secur"},{"key":"462_CR20","doi-asserted-by":"crossref","unstructured":"Uddin M, Haseeb S, Ahmed M, Pathan AS (2011) Comprehensive QoS analysis of MIPL based mobile IPv6 using single vs. dual interfaces. In: Electrical, control and computer engineering (INECCE), 2011 International Conference on, pp 388\u2013393. doi: 10.1109\/INECCE.2011.5953912","DOI":"10.1109\/INECCE.2011.5953912"},{"key":"462_CR21","doi-asserted-by":"crossref","unstructured":"Kiminki S, Saari V, Hirvisalo V, Ryynanen J, Parssinen A, Immonen A, Zetterman T (2011) Design and performance trade-offs in parallelized RF SDR architecture. In: Cognitive radio oriented wireless networks and communications (CROWNCOM), 2011 Sixth International ICST Conference on (IEEE), pp 156\u2013160","DOI":"10.4108\/icst.crowncom.2011.245888"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-013-0462-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-013-0462-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-013-0462-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:17:46Z","timestamp":1559359066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-013-0462-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,27]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1007\/s11036-013-0462-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,27]]}}}