{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:44:08Z","timestamp":1725543848239},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540338949"},{"type":"electronic","value":"9783540338956"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11748625_15","type":"book-chapter","created":{"date-parts":[[2006,5,18]],"date-time":"2006-05-18T21:47:47Z","timestamp":1147988867000},"page":"238-253","source":"Crossref","is-referenced-by-count":23,"title":["Secure Mobile Computing Via Public Terminals"],"prefix":"10.1007","author":[{"given":"Richard","family":"Sharp","sequence":"first","affiliation":[]},{"given":"James","family":"Scott","sequence":"additional","affiliation":[]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Advances in Computers","author":"R. Anderson","year":"2001","unstructured":"Anderson, R., Stajano, F., Lee, J.-H.: Security policies. In: Advances in Computers, vol.\u00a055, Academic Press, London (2001)"},{"key":"15_CR2","unstructured":"Anti-Phishing Working Group (APWG). Phishing activity trends report (June 2005), \n \n http:\/\/antiphishing.org\/"},{"key":"15_CR3","unstructured":"Balfanz, D., Felton, E.: Hand-held computers can be better smart cards. In: Proceedings of USENIX Security (1999)"},{"key":"15_CR4","volume-title":"Proceedings of PERCOM","author":"S. Berger","year":"2005","unstructured":"Berger, S., Kjeldsen, R., Narayanaswami, C., Pinhanez, C., Podlaseck, M., Raghunath, M.: Using symbiotic displays to view sensitive information in public. In: Proceedings of PERCOM, IEEE, Los Alamitos (2005)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of ACM CSCW (2000)","DOI":"10.1145\/358916.358935"},{"key":"15_CR6","volume-title":"Proceedings of CSCW 2000","author":"R. Han","year":"2000","unstructured":"Han, R., Perret, V., Naghshineh, M.: WebSplitter: a unified XML framework for multi-device collaborative web browsing. In: Proceedings of CSCW 2000, ACM Press, New York (2000)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.patcog.2003.10.012","volume":"37","author":"K. Jung","year":"2004","unstructured":"Jung, K., Kim, K.I., Jain, A.K.: Text information extraction in images and video: a survey. Pattern Recognition\u00a037, 977\u2013997 (2004)","journal-title":"Pattern Recognition"},{"key":"15_CR8","unstructured":"Amecisco KeyLogger product range, \n \n http:\/\/www.keylogger.com\/"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Kozuch, M., Satyanarayanan, M.: Internet suspend\/resume. In: Proceedings of the WMCSA 2002 (June 2002)","DOI":"10.1109\/MCSA.2002.1017484"},{"key":"15_CR10","unstructured":"Lewis, C., Rieman, J.: Task-centered user interface design\u2014a practical introduction, University of Colorado, Boulder (1993), This shareware book is available at \n \n ftp.cs.colorado.edu"},{"issue":"11","key":"15_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/384150.384159","volume":"44","author":"B.A. Myers","year":"2001","unstructured":"Myers, B.A.: Using handhelds and PCs together. Communications of the ACM\u00a044(11), 34\u201341 (2001)","journal-title":"Communications of the ACM"},{"key":"15_CR12","unstructured":"Narayanaswami, C., Raghunath, M.T., Kamijoh, N., Inoue, T.: What would you do with 100 MIPS on your wrist? Technical Report RC 22057 (98634), IBM Research (January 2001)"},{"key":"15_CR13","volume-title":"Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies","author":"K. O\u2019Hara","year":"2004","unstructured":"O\u2019Hara, K., Perry, M., Churchill, E.: Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies. Kluwer Academic Publishers, Norwell (2004)"},{"key":"15_CR14","unstructured":"Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Proceedings of ACSA (2004), available from \n \n http:\/\/www.acsa-admin.org\/"},{"key":"15_CR15","volume-title":"Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies","author":"T. Pering","year":"2003","unstructured":"Pering, T., Kozuch, M.: Situated mobility: Using situated displays to support mobile activities. In: Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies, Kluwer, Dordrecht (2003)"},{"key":"15_CR16","unstructured":"Pierce, J.S., Mahaney, H.: Opportunistic annexing for handheld devices: Opportunities and challenges. In: Proceedings of HCIC 2004 (2004)"},{"issue":"9","key":"15_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2003.1231195","volume":"36","author":"M. Raghunath","year":"2003","unstructured":"Raghunath, M., Narayanaswami, C., Pinhanez, C.: Fostering a symbiotic handheld environment. Computer\u00a036(9), 56\u201365 (2003)","journal-title":"Computer"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/4236.656066","volume":"2","author":"T. Richardson","year":"1998","unstructured":"Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing\u00a02(1), 33\u201338 (1998)","journal-title":"IEEE Internet Computing"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Ross, S.J., Hill, J.L., Chen, M.Y., Joseph, A.D., Culler, D.E., Brewer, E.A.: A composable framework for secure multi-modal access to Internet services from post-PC devices. Mob. Netw. Appl.\u00a07(5) (2002)","DOI":"10.1023\/A:1016595717639"},{"key":"15_CR20","unstructured":"Salchow, K.: Sorting through the hype of ubiquitous secure remote access and SSL VPNs. SecurityDocs white paper, \n \n http:\/\/www.securitydocs.com\/library\/3103"},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/22949.24053","volume":"5","author":"R.W. Scheifler","year":"1986","unstructured":"Scheifler, R.W., Gettys, J.: The X window system. ACM Trans. Graph.\u00a05(2), 79\u2013109 (1986)","journal-title":"ACM Trans. Graph."},{"key":"15_CR22","unstructured":"Sharp, R., Scott, J., Beresford, A.: Resources and code accompanying this paper, \n \n http:\/\/www.cambridge.intel-research.net\/securemobilecomputing\/"},{"key":"15_CR23","unstructured":"Spring, T.: Google Desktop Search: Security Threat? Today@PCWorld, \n \n http:\/\/blogs.pcworld.com\/staffblog\/archives\/000264.html"},{"key":"15_CR24","unstructured":"Richardson, T.: RealVNC Ltd. The RFB Protocol (2005), \n \n http:\/\/www.realvnc.com\/docs\/rfbproto.pdf"},{"key":"15_CR25","volume-title":"Extended Abstracts of CHI 2003","author":"D.S. Tan","year":"2003","unstructured":"Tan, D.S., Czerwinski, M.: Information Voyeurism: Social impact of physically large displays on information privacy. In: Extended Abstracts of CHI 2003, ACM Press, New York (2003)"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-45809-3_15","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"R. Want","year":"2002","unstructured":"Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., Light, J.: The personal server: Changing the way we think about ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 194\u2013209. Springer, Heidelberg (2002)"},{"key":"15_CR27","unstructured":"Ylonen, T.: SSH transport layer protocol. RFC 3667"},{"key":"15_CR28","unstructured":"Zhao, Q.A., Stasko, J.T.: The awareness-privacy tradeoff in video supported informal awareness: A study of image-filtering based techniques. Technical Report 98-16, Georgia Institute of Technology (1998)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11748625_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:56:12Z","timestamp":1619492172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11748625_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540338949","9783540338956"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11748625_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}