{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:15:44Z","timestamp":1729642544789,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/dictap.2015.7113194","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T15:25:56Z","timestamp":1433345156000},"page":"178-182","source":"Crossref","is-referenced-by-count":4,"title":["Privacy using mobile cloud computing"],"prefix":"10.1109","author":[{"given":"Jacques Bou","family":"Abdo","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Demerjian","sequence":"additional","affiliation":[]},{"given":"Hakima","family":"Chaouchi","sequence":"additional","affiliation":[]},{"given":"Talar","family":"Atechian","sequence":"additional","affiliation":[]},{"given":"Carole","family":"Bassil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5164-7_12"},{"journal-title":"3rd Generation Partnership Project 3GPP T TR 33 821 V9 0 0 (2009&#x2013;06) 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN \/ 3GPP System Architecture Evolution (SAE) (Release 9)","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAT.2013.6521993"},{"key":"ref13","first-page":"73","article-title":"Ensured confidentiality authentication and key agreement protocol for EPS","author":"abdo","year":"0","journal-title":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952953"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2014.6820523"},{"key":"ref4","article-title":"Crowdsourcing: How the power of the crowd is driving the future of business","author":"howe","year":"2008","journal-title":"Random House"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1287\/mnsc.1120.1599","article-title":"Crowdsourcing new product ideas over time: an analysis of the Dell IdeaStorm community","volume":"59","author":"barry","year":"2013","journal-title":"Management Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772735"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766944"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187971"},{"key":"ref1","first-page":"84","article-title":"Mobile cloud computing: A survey","volume":"1","author":"niroshinie","year":"2013","journal-title":"Future Generation Computer Systems 29"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502057"}],"event":{"name":"2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","start":{"date-parts":[[2015,4,29]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7109553\/7113160\/07113194.pdf?arnumber=7113194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T08:54:48Z","timestamp":1498208088000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7113194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dictap.2015.7113194","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}