{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:54:46Z","timestamp":1725544486555},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333111"},{"type":"electronic","value":"9783540333128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11733447_1","type":"book-chapter","created":{"date-parts":[[2006,3,13]],"date-time":"2006-03-13T00:52:57Z","timestamp":1142211177000},"page":"1-15","source":"Crossref","is-referenced-by-count":9,"title":["Design, Installation and Execution of a Security Agent for Mobile Stations"],"prefix":"10.1007","author":[{"given":"William G.","family":"Sirett","sequence":"first","affiliation":[]},{"given":"John A.","family":"MacDonald","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"3GPP TS 03.48. Technical Specification Group Terminals; Security Mechanisms for the SIM Application Toolkit; Stage 2 (2001), \n \n http:\/\/www.3gpp.org"},{"key":"1_CR2","unstructured":"3GPP TS 23.057. Technical Specification Group Terminals; Mobile Execution Environment (MExE); Functional description; Stage 2 (2003), \n \n http:\/\/www.3gpp.org"},{"key":"1_CR3","unstructured":"3GPP TS 31.101. Technical Specification Group Terminals; UICC-terminal interface; Physical and logical characteristics (2003), \n \n http:\/\/www.3gpp.org"},{"key":"1_CR4","unstructured":"3GPP TS 31.102. Technical Specification Group Terminals; Characteristics of the USIM application (2003), \n \n http:\/\/www.3gpp.org"},{"key":"1_CR5","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California (November 1996), \n \n http:\/\/citeseer.ist.psu.edu\/400120.html"},{"key":"1_CR6","series-title":"The Java Series","volume-title":"MIDP 2.0 Style Guide","author":"C. Block","year":"2003","unstructured":"Block, C., Wagner, A.C.: MIDP 2.0 Style Guide. The Java Series. Addison-Wesley, London (2003)"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-0-387-35575-7_11","volume-title":"7th Annual Working Conference on Information Security Management and Small Systems Security","author":"V. Cordonnier","year":"1999","unstructured":"Cordonnier, V., Watson, A., Nemchenko, S.: Time as an aid to improving security in smart cards. In: 7th Annual Working Conference on Information Security Management and Small Systems Security, pp. 131\u2013144. Kluwer Academic Press, London (1999)"},{"key":"1_CR8","unstructured":"ETSI TS 100 977. Digital cellular telecommunications system(Phase 2+); Specifi- cation of the Subscriber Identity Module - Mobile Equipment (SIM-ME) Interface. ETSI (2000), \n \n http:\/\/www.etsi.org"},{"key":"1_CR9","unstructured":"ETSI TS 101 476. Digital cellular telecommunication system (Phase 2+); Subscriber Identity Module Application Programming Interface (SIM API); SIM API for Java Card; Stage 2 (GSM 03.19). ETSI (2000), \n \n http:\/\/www.etsi.org"},{"key":"1_CR10","unstructured":"Global Platform. Card Specification v2.1.1 (2003), \n \n http:\/\/www.globalplatform.org"},{"key":"1_CR11","unstructured":"GSM 03.19, Version 8.2.0. Digital Cellular Telecommunications System (Phase 2+); Subscriber Identity Module Application Programming Interface (SIM API); AIM API for Java Card; Stage 2. ETSI (2001), \n \n http:\/\/www.etsi.org"},{"key":"1_CR12","unstructured":"GSM 11.14. Digital cellular telecomunnications system (Phase2+); Specification of the SIM Application Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface. ETSI (2001), \n \n http:\/\/www.etsi.org"},{"key":"1_CR13","volume-title":"Mobile Application Development with SMS & the SIM Toolkit; Building Smart Phone Applications","author":"S.B. Guthery","year":"2002","unstructured":"Guthery, S.B., Cronin, M.J.: Mobile Application Development with SMS & the SIM Toolkit; Building Smart Phone Applications. McGraw-Hill, New York (2002)"},{"key":"1_CR14","unstructured":"ISO\/IEC 9798-4. Information technology - Security Techniques - Entity Authentication - Part 4: Mechanisms using a cryptographic check function, 2nd edn. (1999), \n \n http:\/\/www.iso.org"},{"key":"1_CR15","unstructured":"JSR-118 JCP. Mobile Information Device Profile, v2.0 (JSR-118). Sun Microsystems (2002), \n \n http:\/\/java.sun.com"},{"key":"1_CR16","unstructured":"JSR-177 JCP. Security & Trust Services API (SATSA) (JSR-177). Sun Microsystems (2004), \n \n http:\/\/java.sun.com"},{"key":"1_CR17","volume-title":"2nd IEEE International Workshop on Mobile Commerce & Services (WMCS)","author":"J.A. MacDonald","year":"2005","unstructured":"MacDonald, J.A., Mitchell, C.J.: Using the GSM\/UMTS SIM to secure web services. In: 2nd IEEE International Workshop on Mobile Commerce & Services (WMCS), Munich, Germany. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"1_CR18","series-title":"IFIP International Federation for Information Processing","volume-title":"20th IFIP International Information Security Conference (SEC 2005) - Small Systems Security and Smart cards","author":"J.A. MacDonald","year":"2005","unstructured":"MacDonald, J.A., Sirett, W.G., Mitchell, C.J.: Overcoming channel bandwidth constraints in secure SIM applications. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) 20th IFIP International Information Security Conference (SEC 2005) - Small Systems Security and Smart cards, Chiba, Japan. IFIP International Federation for Information Processing, vol.\u00a0181. Springer Science and Business Media, Heidelberg (2005)"},{"key":"1_CR19","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/0-306-46998-7_6","volume-title":"Trusted Information: The New Decade Challenge, IFIP TC11 16th International Conference on Information Security (IFIP\/SEC 2001)","author":"K. Markantonakis","year":"2001","unstructured":"Markantonakis, K.: Is the performance of the cryptographic functions the real bottleneck? In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge, IFIP TC11 16th International Conference on Information Security (IFIP\/SEC 2001), Paris, France, June 11-13, pp. 77\u201392. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"1_CR20","doi-asserted-by":"publisher","DOI":"10.1093\/actrade\/9780192803153.001.0001","volume-title":"Cryptography - A Very Short Introduction","author":"F. Piper","year":"2002","unstructured":"Piper, F., Murphy, S.: Cryptography - A Very Short Introduction. Oxford University Press, Oxford (2002)"},{"key":"1_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/047085670X","volume-title":"Smart Card Handbook","author":"W. Rankl","year":"2003","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook, 3rd edn. John Wiley & Sons, Ltd., Chichester (2003)","edition":"3"},{"key":"1_CR22","unstructured":"Rousseau, L.: Secure time in a portable device. In: Proceedings of 3rd Gemplus Developer Conference, Paris, France 2004. Gemplus (2001)"},{"key":"1_CR23","unstructured":"Sun Wireless Toolkit. Wireless Toolkit, Version 2.1. Sun Microsystems (2004), \n \n http:\/\/java.sun.com\/products\/j2mewtoolkit"},{"key":"1_CR24","volume-title":"GSM and UMTS : The creation of global mobile communications","author":"M. Walker","year":"2002","unstructured":"Walker, M., Wright, T.: GSM and UMTS: The creation of global mobile communications. John Wiley & Sons, Ltd., Chichester (2002)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11733447_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:53:02Z","timestamp":1619491982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11733447_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333111","9783540333128"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11733447_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}