{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:44:21Z","timestamp":1725392661937},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641947","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:35:53Z","timestamp":1291152953000},"page":"2419-2426","source":"Crossref","is-referenced-by-count":1,"title":["Service for secure and protected applications in Collaborative Learning Environments"],"prefix":"10.1109","author":[{"given":"Thiago de Medeiros","family":"Gualberto","sequence":"first","affiliation":[]},{"given":"Sergio Donizetti","family":"Zorzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283972"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2004.10.017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2009.64"},{"key":"ref13","article-title":"Cryptographic Message Syntax (CMS)","author":"housley","year":"2004","journal-title":"RFC 3852"},{"key":"ref14","article-title":"Web Services Security: SOAP Message Security 1.1","author":"nadalin","year":"0","journal-title":"OASIS Standard Specification Retrieved from"},{"journal-title":"ITEXT Java-PDF library","year":"0","key":"ref15"},{"journal-title":"EJBCA Enterprise JavaBeans Certificate Authority","year":"0","key":"ref16"},{"journal-title":"SoapUI The Web Services Testing Tool","year":"0","key":"ref17"},{"key":"ref18","first-page":"24","article-title":"Multiple Electronic Signatures on Multiple Documents","author":"lioy","year":"2004","journal-title":"Proceedings Electronic Government and Commerce Design Modeling Analysis and Security (EGCDMAS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00062-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2005.236"},{"key":"ref6","first-page":"1","article-title":"E-learning: Biometrics as a Security Factor","author":"rabuzin","year":"2006","journal-title":"International Multi-Conference on Computing in Global Information Technology (ICCGI)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/973620.973715"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2008010101"},{"key":"ref7","article-title":"Web Services Architecture","author":"booth","year":"2004","journal-title":"Retrieved From"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359224"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.2.1.60-69"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641947.pdf?arnumber=5641947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:40:22Z","timestamp":1490071222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641947","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}