{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:11:44Z","timestamp":1730211104862,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/cse.2009.41","type":"proceedings-article","created":{"date-parts":[[2009,10,12]],"date-time":"2009-10-12T15:50:02Z","timestamp":1255362602000},"page":"40-47","source":"Crossref","is-referenced-by-count":2,"title":["A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0"],"prefix":"10.1109","author":[{"given":"Sabah","family":"Mohammed","sequence":"first","affiliation":[]},{"given":"Lyle F.","family":"Chamarette","sequence":"additional","affiliation":[]},{"given":"Jinan","family":"Fiaidhi","sequence":"additional","affiliation":[]},{"given":"Sylvia","family":"Osborn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GMAI.2007.33"},{"journal-title":"IBM J Research","article-title":"how to digitally sign and verify xml documents on wireless devices using the bouncy castle crypto apis","year":"2002","author":"yuan","key":"15"},{"volume":"1 4","journal-title":"Reference Guide for the Java 2 SDK Standard Edition","article-title":"sun 2001, java authentication and authorization service (jaas)","year":"2001","key":"16"},{"journal-title":"The DevX Online Journal","article-title":"jaas security in action","year":"2002","author":"gabhart","key":"13"},{"journal-title":"Scalable Vector Graphics (SVG) Tiny 1 2 Specification","article-title":"w3c 2002 recommendation","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.66"},{"journal-title":"The DevX Online Journal","article-title":"kxml: a great find for xml parsing in j2me","year":"2003","author":"cadena","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.31"},{"key":"2","first-page":"2052","volume":"26","author":"lam","year":"2003","journal-title":"Lightweight Security for Mobile Commerce Transactions Computer Communications Journal"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.31"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2006.171.179"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CAMP.2005.51"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/38.761551"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1117\/12.587402"},{"journal-title":"Web 2 0 Security - Defending AJAX RIA AND SOA","year":"2007","author":"shah","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2007.51"}],"event":{"name":"2009 International Conference on Computational Science and Engineering","start":{"date-parts":[[2009,8,29]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,8,31]]}},"container-title":["2009 International Conference on Computational Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5282954\/5282958\/05283025.pdf?arnumber=5283025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:43:48Z","timestamp":1489880628000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5283025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cse.2009.41","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}