{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:10:37Z","timestamp":1725401437139},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/cscwd.2012.6221825","type":"proceedings-article","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T15:13:09Z","timestamp":1340982789000},"page":"244-250","source":"Crossref","is-referenced-by-count":0,"title":["A smart card-based secure software distribution scheme for mobile application market"],"prefix":"10.1109","author":[{"given":"Ya-Jun","family":"Fan","sequence":"first","affiliation":[]},{"given":"Qiao-Yan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Rise of Mobile Application Stores -Gateways to the World of Apps","year":"0","key":"3"},{"journal-title":"The Mobile Application Market","year":"0","author":"svanberg","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2010.05.006"},{"key":"7","first-page":"3807","article-title":"A two-phase software protection scheme for android operation system","author":"fan","year":"2011","journal-title":"International Proceedings of the 2nd Conference on Information Science and Engineering (ICISE)"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"6"},{"journal-title":"Report Google's Android Market License Verification Easily Circumvented Will Not Stop Pirates","year":"0","key":"5"},{"journal-title":"Application Licensing","year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proceedings of Advance in Cryptology (CRYPTO 99)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"journal-title":"Applied Cryptography-Protocols Algorithms and Source Code in C 2nd Edi","year":"1995","author":"schneier","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"}],"event":{"name":"2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2012,5,23]]},"location":"Wuhan, China","end":{"date-parts":[[2012,5,25]]}},"container-title":["Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6214739\/6221782\/06221825.pdf?arnumber=6221825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T16:46:34Z","timestamp":1497977194000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6221825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2012.6221825","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}