{"id":"https://openalex.org/W2615342374","doi":"https://doi.org/10.1007/978-3-319-50500-8_17","title":"MULTOS and MULTOS Application Development","display_name":"MULTOS and MULTOS Application Development","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2615342374","doi":"https://doi.org/10.1007/978-3-319-50500-8_17","mag":"2615342374"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-50500-8_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-50500-8_17","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Smart Cards, Tokens, Security and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053230200","display_name":"Chris Torr","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chris Torr","raw_affiliation_strings":["MAOSCO Ltd, London, UK"],"affiliations":[{"raw_affiliation_string":"MAOSCO Ltd, London, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074962907","display_name":"Keith Mayes","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Keith Mayes","raw_affiliation_strings":["Director of the Information Security Group, Head of the School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK","Director of the Information Security Group, Head of the School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Director of the Information Security Group, Head of the School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Director of the Information Security Group, Head of the School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053230200"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4542,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61841523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"469","last_page":"496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.5644000172615051,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.5644000172615051,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.5080999732017517,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.4902999997138977,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5583223104476929},{"id":"https://openalex.org/keywords/development","display_name":"Development (topology)","score":0.47367531061172485},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4537425935268402},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3274116516113281},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3144712448120117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20372793078422546},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.048715293407440186}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5583223104476929},{"id":"https://openalex.org/C2776542497","wikidata":"https://www.wikidata.org/wiki/Q5266672","display_name":"Development (topology)","level":2,"score":0.47367531061172485},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4537425935268402},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3274116516113281},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3144712448120117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20372793078422546},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.048715293407440186},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-50500-8_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-50500-8_17","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Smart Cards, Tokens, Security and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2120234551","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
