{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:51:18Z","timestamp":1730238678768,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5664728","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T20:28:00Z","timestamp":1292358480000},"page":"472-477","source":"Crossref","is-referenced-by-count":0,"title":["Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials"],"prefix":"10.1109","author":[{"given":"Jinan","family":"Fiaidhi","sequence":"first","affiliation":[]},{"given":"Sabah","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"David A. J.","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Lyle F.","family":"Chamarette","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Use of SVG and ECMAScript Technology for e-Learning Purposes","author":"neumann","year":"2005","journal-title":"ISPRS Workshop Commissions VI\/1 – VI\/2 Tools and Techniques for E-Learning Potsdam"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fi1010014"},{"journal-title":"Adding AJAX","year":"2007","author":"powers","key":"ref12"},{"journal-title":"Mobile web design","year":"2008","author":"moll","key":"ref13"},{"key":"ref14","article-title":"Firemark: a Java Tool for SVG Watermarking","author":"battiato","year":"2005","journal-title":"SVG Open Conference"},{"journal-title":"XML Security RSA Security's Official Guide","year":"2002","author":"dournaee","key":"ref15"},{"journal-title":"Bouncy Castle API","year":"0","key":"ref16"},{"year":"0","key":"ref17","article-title":"kXML 2 API"},{"key":"ref18","article-title":"AJAX for Java developers: Build dynamic Java applications","author":"mccarthy","year":"2005","journal-title":"IBM Journal of Research"},{"article-title":"Top 10 AJAX Security Holes and Driving Factors","year":"0","author":"shah","key":"ref19"},{"key":"ref4","article-title":"Beyond Management: The Personal Learning Environment","author":"downes","year":"2009","journal-title":"Ed Media Conference 2009"},{"key":"ref3","article-title":"Asynchronous Learning Environments using AJAX","author":"lin","year":"2007","journal-title":"Proc IEEE International Symposium on Multimedia"},{"key":"ref6","article-title":"AJAX Security","author":"van der stock","year":"2006","journal-title":"presentation given"},{"key":"ref5","article-title":"On the way towards Personal Learning Environments: Seven crucial aspects","author":"schaffert","year":"2008","journal-title":"eLearning Papers"},{"journal-title":"Workshop on Mobile AJAX September 28 2007 at the Microsoft Silicon Valley campus in Mountain View","year":"0","key":"ref8"},{"journal-title":"AJAX Security Basics CISSP CISSP","year":"2006","author":"hayre","key":"ref7"},{"journal-title":"How Learning Management Systems are Integrating Social Learning Technologies Review and Outlook","year":"2008","author":"clarey","key":"ref2"},{"key":"ref1","first-page":"240","article-title":"The Impact of AJAX Vulnerability in Web 2.0 Applications","volume":"3","author":"al-tameem","year":"2008","journal-title":"Journal of Information Assurance and Security"},{"journal-title":"AJAX Design Patterns Creating Web 2 0 Sites with Programming and Usability","year":"2006","author":"mahemoff","key":"ref9"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2010,7,5]]},"location":"Thunder Bay, ON, Canada","end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05664728.pdf?arnumber=5664728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:59:11Z","timestamp":1490090351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5664728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5664728","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}