{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:09:51Z","timestamp":1761620991973,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T00:00:00Z","timestamp":1213660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,17]]},"DOI":"10.1145\/1378600.1378612","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"94-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Enhancing web browsing security on public terminals using mobile composition"],"prefix":"10.1145","author":[{"given":"Richard","family":"Sharp","sequence":"first","affiliation":[{"name":"Citrix Systems Inc, Cambridge, UK"}]},{"given":"Anil","family":"Madhavapeddy","sequence":"additional","affiliation":[{"name":"Citrix Systems Inc, Cambridge, UK"}]},{"given":"Roy","family":"Want","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]},{"given":"Trevor","family":"Pering","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"July","author":"ALVES T.","year":"2004","unstructured":"ALVES , T. , AND FELTON , D. TrustZone: Integrated hardware and software security , July 2004 . ARM White Paper . ALVES, T., AND FELTON, D. TrustZone: Integrated hardware and software security, July 2004. ARM White Paper."},{"key":"e_1_3_2_1_2_1","unstructured":"ANDERSON R. Trusted Computing FAQ. Available at: http:\/\/www.cl.cam.ac.uk\/users\/rja14\/tcpa-faq.html  ANDERSON R. Trusted Computing FAQ. Available at: http:\/\/www.cl.cam.ac.uk\/users\/rja14\/tcpa-faq.html"},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Computers vol 55","author":"ANDERSON R.","year":"2001","unstructured":"ANDERSON , R. , STAJANO , F. , AND LEE , J.-H. Security policies . In Advances in Computers vol 55 ( 2001 ), Academic Press . ANDERSON, R., STAJANO, F., AND LEE, J.-H. Security policies. In Advances in Computers vol 55 (2001), Academic Press."},{"key":"e_1_3_2_1_4_1","volume-title":"June","author":"ANTI-PHISHING WORKING GROUP (APWG).","year":"2005","unstructured":"ANTI-PHISHING WORKING GROUP (APWG). Phishing activity trends report , June 2005 . http:\/\/antiphishing.org\/. ANTI-PHISHING WORKING GROUP (APWG). Phishing activity trends report, June 2005. http:\/\/antiphishing.org\/."},{"volume-title":"3rd 2005 edition of Business Wire. Available at: http:\/\/www.businesswire.com\/","author":"ANTI-PHISHING WORKING GROUP (APWG) expands online identity theft charter. Aug.","key":"e_1_3_2_1_5_1","unstructured":"ANTI-PHISHING WORKING GROUP (APWG) expands online identity theft charter. Aug. 3rd 2005 edition of Business Wire. Available at: http:\/\/www.businesswire.com\/ . ANTI-PHISHING WORKING GROUP (APWG) expands online identity theft charter. Aug. 3rd 2005 edition of Business Wire. Available at: http:\/\/www.businesswire.com\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of USENIX Security","author":"BALFANZ D.","year":"1999","unstructured":"BALFANZ , D. , AND FELTON , E. Hand-held computers can be better smart cards . In Proceedings of USENIX Security ( 1999 ). BALFANZ, D., AND FELTON, E. Hand-held computers can be better smart cards. In Proceedings of USENIX Security (1999)."},{"key":"e_1_3_2_1_7_1","unstructured":"BBC NEWS: First mobile phone virus created: At http:\/\/news.bbc.co.uk\/1\/hi\/technology\/3809855.htm.  BBC NEWS: First mobile phone virus created: At http:\/\/news.bbc.co.uk\/1\/hi\/technology\/3809855.htm."},{"key":"e_1_3_2_1_8_1","unstructured":"BLUETOOTH SPECIFICATION VERSION 1.1. Available at: http:\/\/www.bluetooth.com\/.  BLUETOOTH SPECIFICATION VERSION 1.1. Available at: http:\/\/www.bluetooth.com\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Creating Applications with Mozilla. O'Reilly","author":"BOSWELL D.","year":"2002","unstructured":"BOSWELL , D. , KING , B. , OESCHGER , I. , COLLINS , P. , AND MURPHY , E. Creating Applications with Mozilla. O'Reilly , 2002 . BOSWELL, D., KING, B., OESCHGER, I., COLLINS, P., AND MURPHY, E. Creating Applications with Mozilla. O'Reilly, 2002."},{"key":"e_1_3_2_1_10_1","unstructured":"CHOWN P. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS). RFC 3268.   CHOWN P. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS). RFC 3268."},{"key":"e_1_3_2_1_11_1","unstructured":"COLE B. Intel hardwires security in new mobile IA PXA27x CPU family. http:\/\/iapplianc-web.com\/story\/OEG20040412N0006BC.htm.  COLE B. Intel hardwires security in new mobile IA PXA27x CPU family. http:\/\/iapplianc-web.com\/story\/OEG20040412N0006BC.htm."},{"key":"e_1_3_2_1_12_1","volume-title":"The TLS protocol","author":"DIERKS T.","year":"1999","unstructured":"DIERKS , T. The TLS protocol , IETF Network Working Group RFC 2246, January 1999 . DIERKS, T. The TLS protocol, IETF Network Working Group RFC 2246, January 1999."},{"key":"e_1_3_2_1_13_1","volume-title":"JavaScript: The Definitive Guide. O'Reilly","author":"FLANAGAN D.","year":"2002","unstructured":"FLANAGAN , D. JavaScript: The Definitive Guide. O'Reilly , 2002 . FLANAGAN, D. JavaScript: The Definitive Guide. O'Reilly, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTMOBILE.2007.19"},{"key":"e_1_3_2_1_15_1","unstructured":"HARKINS D. AND CARREL D. The Internet Key Exchange. RFC 2409.   HARKINS D. AND CARREL D. The Internet Key Exchange. RFC 2409."},{"key":"e_1_3_2_1_16_1","unstructured":"JOSEFSSON S. The Base16 Base32 and Base64 data encodings. RFC 3548.   JOSEFSSON S. The Base16 Base32 and Base64 data encodings. RFC 3548."},{"key":"e_1_3_2_1_17_1","volume-title":"Compact HTML for small information appliances","author":"KAMADA T.","year":"1998","unstructured":"KAMADA , T. Compact HTML for small information appliances , 1998 . W3C Note : Available: http:\/\/www.w3.org\/TR\/1998\/NOTEcopactHTML19980209\/ KAMADA, T. Compact HTML for small information appliances, 1998. W3C Note: Available: http:\/\/www.w3.org\/TR\/1998\/NOTEcopactHTML19980209\/"},{"key":"e_1_3_2_1_18_1","volume-title":"4th","author":"LECLAIRE J.","year":"2005","unstructured":"LECLAIRE , J. Pharming and SPIM plaguing Internet . 4th June 2005 . TechNewsWorld. At http:\/\/www.technewsworld.com\/story\/news\/42054.html. LECLAIRE, J. Pharming and SPIM plaguing Internet. 4th June 2005. TechNewsWorld. At http:\/\/www.technewsworld.com\/story\/news\/42054.html."},{"key":"e_1_3_2_1_19_1","volume-title":"UK police issue \"vicious\" Trojan alert. 13th","author":"LEYDEN J.","year":"2004","unstructured":"LEYDEN , J. UK police issue \"vicious\" Trojan alert. 13th August 2004 . The Register . Available from http:\/\/www.theregister.co.uk\/2004\/08\/13\/trojan phish\/. LEYDEN, J. UK police issue \"vicious\" Trojan alert. 13th August 2004. The Register. Available from http:\/\/www.theregister.co.uk\/2004\/08\/13\/trojan phish\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of USENIX","author":"CUNE J.","year":"2006","unstructured":"Mc CUNE , J. , PERRIG , A. , REITER , M. Bump in the ether: a framework for securing sensitive user input . In Proceedings of USENIX 2006 . USENIX Association. McCUNE, J., PERRIG, A., REITER, M. Bump in the ether: a framework for securing sensitive user input. In Proceedings of USENIX 2006. USENIX Association."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/384150.384159"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.33"},{"key":"e_1_3_2_1_24_1","volume-title":"Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies","author":"PERING T.","year":"2003","unstructured":"PERING , T. , AND KOZUCH , M. Situated mobility: Using situated displays to support mobile activities . In Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies ( 2003 ), Kluwer . PERING, T., AND KOZUCH, M. Situated mobility: Using situated displays to support mobile activities. In Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies (2003), Kluwer."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1231195"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of the USENIX Security Symposium","author":"ROSS B.","year":"2005","unstructured":"ROSS , B. , JACKSON , C. , MIYAKE , N. , BONEH , D. , AND MITCHELL , J. C. Stronger password authentication using browser extensions . In Proc. of the USENIX Security Symposium ( 2005 ), USENIX association. ROSS, B., JACKSON, C., MIYAKE, N., BONEH, D., AND MITCHELL, J. C. Stronger password authentication using browser extensions. In Proc. of the USENIX Security Symposium (2005), USENIX association."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016595717639"},{"key":"e_1_3_2_1_28_1","volume-title":"Applied cryptography: protocols, algorithms, and sourcecode in C","author":"SCHNEIER B.","year":"1994","unstructured":"SCHNEIER , B. Applied cryptography: protocols, algorithms, and sourcecode in C . John Wiley & amp; Sons, New York, 1994 . SCHNEIER, B. Applied cryptography: protocols, algorithms, and sourcecode in C. John Wiley &amp; Sons, New York, 1994."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_15"},{"key":"e_1_3_2_1_30_1","unstructured":"SOPHOS PRESS RELEASE. UK online bank accounts put at risk by new trojan. Available from http:\/\/www.sophos.com\/virusinfo\/articles\/ukbanktrojan.html.  SOPHOS PRESS RELEASE. UK online bank accounts put at risk by new trojan. Available from http:\/\/www.sophos.com\/virusinfo\/articles\/ukbanktrojan.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647988.741493"},{"key":"e_1_3_2_1_32_1","unstructured":"YLONEN T. SSH transport layer protocol. RFC 4253.  YLONEN T. SSH transport layer protocol. RFC 4253."},{"key":"e_1_3_2_1_33_1","unstructured":"XMLHTTP.Available at: http:\/\/en.wikipedia.org\/wiki\/XMLHttpRequest.  XMLHTTP.Available at: http:\/\/en.wikipedia.org\/wiki\/XMLHttpRequest."}],"event":{"name":"Mobisys08: The 6th International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Breckenridge CO USA","acronym":"Mobisys08"},"container-title":["Proceedings of the 6th international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378600.1378612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378600.1378612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:54Z","timestamp":1750258674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378600.1378612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,17]]},"references-count":32,"alternative-id":["10.1145\/1378600.1378612","10.1145\/1378600"],"URL":"https:\/\/doi.org\/10.1145\/1378600.1378612","relation":{},"subject":[],"published":{"date-parts":[[2008,6,17]]},"assertion":[{"value":"2008-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}