{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:32:54Z","timestamp":1742913174967,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402376"},{"type":"electronic","value":"9783319402383"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40238-3_31","type":"book-chapter","created":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T19:47:44Z","timestamp":1466452064000},"page":"324-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Health Training Platform"],"prefix":"10.1007","author":[{"given":"Clifton","family":"Clunie","sequence":"first","affiliation":[]},{"given":"Virg\u00edlio","family":"Reis","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Mendes","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Barroso","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"31_CR1","unstructured":"TNW. \n                      http:\/\/thenextweb.com\/insider\/2013\/11\/05\/remote-personal-trainer-service-wello-launches-demand-workouts\/#gref"},{"key":"31_CR2","unstructured":"FityGo. \n                      www.ifity.net\n                      \n                    , \n                      https:\/\/www.ifity.net\/#\/main"},{"key":"31_CR3","unstructured":"Coach, R.: \n                      www.remotecoachapp.com\n                      \n                    , \n                      https:\/\/www.remotecoachapp.com\/tour"},{"key":"31_CR4","unstructured":"Provos, D.M.N.: A future-adaptable password scheme. In: 1999 USENIX Annual Technical Conference, Monterey, California, USA (1999)"},{"key":"31_CR5","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption, San Diego (2000)"},{"key":"31_CR6","unstructured":"Clunie, C.: Desarrollo de una Aplicaci\u00f3n M\u00f3vil basada en Android utilizando sensores como apoyo al Entrenamiento Personal, Panam\u00e1: Technological University of Panama, Computer Systems Engineering Faculty, Computer and Systems Simulation Department (2013)"},{"key":"31_CR7","unstructured":"\u00a92016 Arduino. \n                      https:\/\/www.arduino.cc\/en\/Main\/arduinoBoardUno"},{"key":"31_CR8","unstructured":"Microchip Technology Inc. The Embedded Control Solutions Company\u00ae. \n                      http:\/\/www.microchip.com\/wwwproducts\/Devices.aspx?product=RN42"},{"key":"31_CR9","unstructured":"SRF04 - Ultra-Sonic Ranger, 22 December 2010. \n                      http:\/\/www.robot-electronics.co.uk\/htm\/srf04tech.htm"},{"key":"31_CR10","unstructured":"Federal Information Processing Standards Publications, advanced encryption standard (AES), 26 November 2001. \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"31_CR11","unstructured":"atsec information security corporation: National Institute of Standards and Technology\u2019s, 16 December 2015. \n                      http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/140sp\/140sp2549.pdf"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, R.: HMAC: Keyed-Hashing for Message Authentication, February 1997. \n                      https:\/\/tools.ietf.org\/html\/rfc2104","DOI":"10.17487\/rfc2104"},{"key":"31_CR13","unstructured":"National Institute of Standards and Technology, U.S. Federal Information Processing Standard, \u201cNIST,\u201d (2015). \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf"}],"container-title":["Lecture Notes in Computer Science","Universal Access in Human-Computer Interaction. Users and Context Diversity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40238-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T01:07:49Z","timestamp":1594343269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40238-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402376","9783319402383"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40238-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UAHCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Universal Access in Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"uahci2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}