{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:49:14Z","timestamp":1729658954424,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/prisms.2014.6970599","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T17:20:33Z","timestamp":1418059233000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Android encryption systems"],"prefix":"10.1109","author":[{"given":"Peter","family":"Teufl","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Fitzek","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Marsalek","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Oprisnik","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Zefferer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"373","article-title":"FROST-Forensic Recovery of Scrambled Telephones","author":"muller","year":"2013","journal-title":"ACNS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784733"},{"key":"ref10","first-page":"1","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"2009","journal-title":"self published"},{"key":"ref6","article-title":"iPhone data protection in depth","author":"bedrune","year":"2011","journal-title":"Sogeti I ESEC Tech Rep"},{"journal-title":"Android","article-title":"KeyStore Implementation","year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.4236\/jis.2010.12009","article-title":"IPHONE SECURITY ANALYSIS","volume":"1","author":"pandya","year":"2008","journal-title":"Journal of Information Security"},{"key":"ref8","first-page":"14","article-title":"Recommendation for Password-Based Key Derivation Part 1: Storage Applications","author":"turan","year":"2010","journal-title":"NIST Special Publication"},{"key":"ref7","article-title":"iOS Encryption Systems: Deploying iOS Devices in Security-Critical En-vironments","author":"teufl","year":"2013","journal-title":"Proceedings of the 10th International Conference on Security and Cryptography-SECRYPT 2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CASoN.2010.172"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2898","article-title":"PKCS Password-Based Cryptography Specification Version 2.0","author":"kaliski","year":"2000"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122788"}],"event":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6963210\/6970591\/06970599.pdf?arnumber=6970599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:44:21Z","timestamp":1498167861000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6970599\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/prisms.2014.6970599","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}