{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T09:18:46Z","timestamp":1768814326109,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583635","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"655-659","source":"Crossref","is-referenced-by-count":95,"title":["Security and privacy in mobile cloud computing"],"prefix":"10.1109","author":[{"given":"Hui","family":"Suo","sequence":"first","affiliation":[]},{"given":"Zhuohua","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiafu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Keliang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.189"},{"key":"18","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1007\/978-3-642-10625-5_37","article-title":"Multi-agent itinerary planning for wireless sensor networks","volume":"22","author":"chen","year":"2009","journal-title":"Quality of Service in Heterogeneous Networks"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2012.6526342"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2239630"},{"key":"14","article-title":"Mobi Cloud: A Geodistributed mobile cloud computing platform","author":"tianyi","year":"2012","journal-title":"Proc of 8th International Conf on Network and Service Management (CNSM)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2011.11.001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014374"},{"key":"2","article-title":"AMVSC: A framework of adaptive mobile video streaming in the cloud","author":"chen","year":"2012","journal-title":"Proc of IEEE Globecom 2012 Anaheim"},{"key":"1","year":"2011","journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566762"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.44"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"5","article-title":"Cloud AV: N-Version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proc of the 17th USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"9","article-title":"Rethinking antivirus: Executable analysis in the network cloud","author":"oberheide","year":"2007","journal-title":"USENIX Workshop on Hot Topics in Security (HotSec)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2012.02.002"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","location":"Sardinia, Italy","start":{"date-parts":[[2013,7,1]]},"end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583635.pdf?arnumber=6583635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:58:37Z","timestamp":1498064317000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583635","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}