{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:03:22Z","timestamp":1648857802645},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T00:00:00Z","timestamp":1387238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11227-013-1066-9","type":"journal-article","created":{"date-parts":[[2013,12,16]],"date-time":"2013-12-16T09:16:20Z","timestamp":1387185380000},"page":"54-74","source":"Crossref","is-referenced-by-count":5,"title":["Design and analysis of a secure and effective emergency system for mountaineering events"],"prefix":"10.1007","volume":"70","author":[{"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yu-Yi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Cheng-Hsun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,17]]},"reference":[{"key":"1066_CR1","unstructured":"Sport England: primary offer data information pack for mountaineering, website: http:\/\/www.sportengland.org\/ , Access available 31 May 2011"},{"key":"1066_CR2","unstructured":"Lo FE, Lin CA (2002) The study on a classified framework of hiking trails\u2014a case study on National Parks which are located at mountain areas, etd-0812102-143436"},{"key":"1066_CR3","unstructured":"Formosa news: Heavy casualties in Alishan Forest Railway accident, website: http:\/\/englishnews.ftv.com.tw\/read.aspx?sno=415D8D883198D41B3474E3E0B6CE4D1D . Access available 31 May 2011"},{"key":"1066_CR4","doi-asserted-by":"crossref","unstructured":"Vouk MA (2008) Cloud computing\u2014issues, research and implementations. In: IEEE international conference on information technology interfaces (ITI), pp 31\u201340","DOI":"10.2498\/cit.1001391"},{"key":"1066_CR5","doi-asserted-by":"crossref","unstructured":"Beaty K, Kochut A, Shaikh H (2009) Desktop to cloud transformation planning. In: IEEE international symposium on parallel and distributed processing (IPDPS)","DOI":"10.1109\/IPDPS.2009.5161236"},{"key":"1066_CR6","doi-asserted-by":"crossref","unstructured":"Ohlman B, Eriksson A, Rembarz R (2009) What networking of information can do for cloud computing, In: IEEE international workshops on enabling technologies: infrastructures for collaborative enterprises (WETICE), pp 78\u201383","DOI":"10.1109\/WETICE.2009.27"},{"key":"1066_CR7","unstructured":"(2009) Introduction to Cloud Computing, architecture. Sun Microsystems, Inc. http:\/\/www.sun.com\/featured-articles\/CloudComputing.pdf"},{"key":"1066_CR8","unstructured":"Li H, Sedayao J, Hahn-Steichen J, Jimison E, Spence C, Chahal S (2009) Developing an enterprise cloud computing strategy. Intel Corporation, pp 1\u201316"},{"key":"1066_CR9","unstructured":"Mell P, Grance T (2009) The NIST Definition of Cloud Computing, National Institute of Standards and Technology"},{"key":"1066_CR10","doi-asserted-by":"crossref","unstructured":"Muttik I, Barton C (2009) Cloud security technologies, Information Security Technical Report, pp 1\u20136","DOI":"10.1016\/j.istr.2009.03.001"},{"key":"1066_CR11","doi-asserted-by":"crossref","unstructured":"Itani W, Kayssi A, Chehab A (2009) Privacy as a service privacy-aware data storage and processing in cloud computing architectures. In: IEEE international conference on dependable, autonomic and secure computing (DASC), pp 711\u2013716","DOI":"10.1109\/DASC.2009.139"},{"key":"1066_CR12","doi-asserted-by":"crossref","unstructured":"Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust management, In: IEEE international conference on dependable, autonomic and secure computing (DASC), pp 717\u2013722","DOI":"10.1109\/DASC.2009.149"},{"key":"1066_CR13","doi-asserted-by":"crossref","unstructured":"Berger S, Caceres R, Goldman K, Pendarakis D, Perez R, Rao JR, Rom E, Sailer R, Schildhauer W, Srinivasan D, Tal S, Valdez E (2009) Security for the cloud infrastructure-trusted virtual data center implementation. IBM J Res Dev 53:6:1\u20136:12","DOI":"10.1147\/JRD.2009.5429060"},{"key":"1066_CR14","unstructured":"Mambo M, Usuda K, Okamoto E (1996) Proxy signature: delegation of the power to sign message. IEICE Trans Fundam E79-A(9):1338\u20131353"},{"key":"1066_CR15","unstructured":"Lee B, Kim H, Kim K (2001) Strong proxy signature and its application. In: Proceedings of SCIS2001, pp 603\u2013608"},{"issue":"3","key":"1066_CR16","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr CP (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161\u2013174","journal-title":"J Cryptol"},{"key":"1066_CR17","unstructured":"Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: International conference in information and communications security. Lecture notes in computer science, pp 223\u2013232"},{"key":"1066_CR18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Mag Commun ACM 21:120\u2013126","journal-title":"Mag Commun ACM"},{"key":"1066_CR19","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"1066_CR20","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: ACM conference on computer and communications security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"1066_CR21","unstructured":"Pointcheval D, Stern J (1996) Security proofs for signature schemes. Advances in cryptology\u2014EUROCRYPT \u201996. In: Maurer UM (ed) Lecture Notes in Computer Science, vol 1070, pp 387\u2013398"},{"key":"1066_CR22","doi-asserted-by":"crossref","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396","DOI":"10.1007\/s001450010003"},{"key":"1066_CR23","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"1066_CR24","unstructured":"Internet Engineering Task Force (IETF) Working Group (1999) Diffie-Hellman Key Agreement Method, RFC 2631"},{"key":"1066_CR25","unstructured":"HTC product (2011) http:\/\/www.htc.com\/hk-en\/product\/desirehd\/specification.html"},{"key":"1066_CR26","unstructured":"Finneran MF (2001) WiMax versus Wi-Fi, dBrn Associates Inc., http:\/\/media.techtarget.com\/searchMobileComputing\/downloads\/Finneran.pdf"},{"key":"1066_CR27","unstructured":"LAN\/MAN Standards Committee of the IEEE computer Society (2010) 802.3ba-2010 IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements part 3: carrier sense multiple access with collision detection (CSMA\/CD) access method and physical layer specifications amendment 4: media access control parameters, physical layers and management parameters for 40 Gb\/s and 100 Gb\/s operation, pp 1\u2013457"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1066-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-1066-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1066-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T23:39:31Z","timestamp":1564961971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-1066-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,17]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["1066"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-1066-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,17]]}}}