{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:02:58Z","timestamp":1743087778696,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":39,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_11","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T09:49:39Z","timestamp":1140428979000},"page":"153-171","source":"Crossref","is-referenced-by-count":3,"title":["Combining World Wide Web and Wireless Security"],"prefix":"10.1007","author":[{"given":"Joris","family":"Claessens","sequence":"first","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"American Express. Private Payments. http:\/\/www.americanexpress.com\/privatepayments\/ .","key":"11_CR1"},{"unstructured":"Banxafe. http:\/\/www.banxafe.com\/ .","key":"11_CR2"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S. M. Bellovin","year":"1989","unstructured":"S. M. Bellovin. Security Problems in the TCP\/IP Protocol Suite. Computer Communication Review, 19(2):32\u201348, April 1989.","journal-title":"Computer Communication Review"},{"unstructured":"Simon Blake-Wilson, Magnus Nystrom, David Hopwood, Jan Mikkelsen, and Tim Wright. TLS Extensions. IETF Internet Draft, June 2001.","key":"11_CR4"},{"unstructured":"Bluetooth SIG. http:\/\/www.bluetooth.com\/ .","key":"11_CR5"},{"unstructured":"Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting Mobile Communications: The Insecurity of 802.11. http:\/\/www.isaac.cs.berkeley.edu\/isaac\/wep-draft.pdf .","key":"11_CR6"},{"unstructured":"Clara Centeno. Mobile Payment Industry Fora-Consolidation of Initiatives Expected. Electronic Payment Systems Observatory-Newsletter, ePSO-N, (8):8\u201312, July 2001. Available at http:\/\/epso.jrc.es\/ .","key":"11_CR7"},{"doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen. The TLS Protocol Version 1.0. IETF Request for Comments, RFC 2246, January 1999.","key":"11_CR8","DOI":"10.17487\/rfc2246"},{"unstructured":"Digipass. http:\/\/www.vasco.com\/ .","key":"11_CR9"},{"doi-asserted-by":"crossref","unstructured":"D. Eastlake, J. Reagle, and D. Solo. XML-Signature Syntax and Processing. IETF Request for Comments, RFC 3075, March 2001.","key":"11_CR10","DOI":"10.17487\/rfc3075"},{"unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); Security mechanisms for the SIM Application Toolkit; Stage 1. ETSI TS 101 180 (GSM 02.48).","key":"11_CR11"},{"unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); Security mechanisms for the SIM Application Toolkit; Stage 2. ETSI TS 101 181 (GSM 03.48).","key":"11_CR12"},{"unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); Specification of the SIM Application Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface. ETSI TS 101 267 (GSM 11.14).","key":"11_CR13"},{"unstructured":"GiSMo. http:\/\/www.gismo.net\/ .","key":"11_CR14"},{"unstructured":"IETF Working Group. IP Routing for Wireless\/Mobile Hosts (mobileip).","key":"11_CR15"},{"unstructured":"InternetCash. http:\/\/www.internetcash.com\/ .","key":"11_CR16"},{"doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and Susanne Wetzel. Security Weaknesses in Bluetooth. In D. Naccache, editor, Progress an Cryptology-Proceedings of the Cryptographers\u2019 Drack at RSA 2001, Lecture Notes in Computer Science, LNCS 2020, pages 176\u2013191. Springer-Verlag, 2001.","key":"11_CR17","DOI":"10.1007\/3-540-45353-9_14"},{"unstructured":"Jalda. http:\/\/www.jalda.com\/ .","key":"11_CR18"},{"unstructured":"Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, and Ruth C. Taylor. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21 st National Information Systems Security Conference, pages 303\u2013314, October 1998.","key":"11_CR19"},{"unstructured":"Mint. http:\/\/www.mint.nu\/ .","key":"11_CR20"},{"unstructured":"Mobile Electronic Signature Consortium. http:\/\/www.msign.org\/ .","key":"11_CR21"},{"unstructured":"NTT DoCoMo. i-mode. http:\/\/www.nttdocomo.co.jp\/i\/ .","key":"11_CR22"},{"unstructured":"Paybox. http:\/\/www.paybox.de\/ .","key":"11_CR23"},{"unstructured":"Proton. http:\/\/www.protonworld.com\/ .","key":"11_CR24"},{"doi-asserted-by":"crossref","unstructured":"E. Rescorla and A. Schiffman. The Secure HyperText Transfer Protocol. IETF Request for Comments, RFC 2660, August 1999.","key":"11_CR25","DOI":"10.17487\/rfc2660"},{"unstructured":"Eric Rescorla. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, 2000.","key":"11_CR26"},{"unstructured":"Bruce Schneier. European Cellular Encryption Algorithms. Crypto-Gram, December 1999.","key":"11_CR27"},{"unstructured":"SET Secure Electronic Transaction LLC. SET Secure Electronic Transaction Specification. http:\/\/www.setco.org\/ .","key":"11_CR28"},{"unstructured":"Trusted Computing Platform Alliance. http:\/\/www.trustedpc.org\/ .","key":"11_CR29"},{"unstructured":"The UMTS Forum. http:\/\/www.umts-forum.org\/ .","key":"11_CR30"},{"doi-asserted-by":"crossref","unstructured":"Klaus Vedder. GSM: Security, Services and the SIM. In B. Preneel and V. Rijmen, editors, State of the Art in Applied Cryptography, Lecture Notes in Computer Science, LNCS 1528, pages 227\u2013243. Springer-Verlag, 1998.","key":"11_CR31","DOI":"10.1007\/3-540-49248-8_10"},{"doi-asserted-by":"crossref","unstructured":"M. Walker. On the security of 3GPP networks. Invited talk at Eurocrypt 2000.","key":"11_CR32","DOI":"10.1007\/3-540-45539-6_8"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP Certificate and CRL Profiles. Approved 22-May-2001.","key":"11_CR33","DOI":"10.1049\/cp:20010502"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP Public Key Infrastructure. Version 24-Apr-2001.","key":"11_CR34","DOI":"10.1049\/cp:20010502"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP TLS Profile and Tunneling. Version 11-April-2001.","key":"11_CR35","DOI":"10.1049\/cp:20010502"},{"unstructured":"Wireless Application Protocol Forum. WAP Transport Layer End-to-end Security. Approved Version 28-June-2001.","key":"11_CR36"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP Wireless Identity Module, Part: Security. Version 12-July-2001.","key":"11_CR37","DOI":"10.1049\/cp:20010502"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP Wireless Transport Layer Security. Version 06-Apr-2001.","key":"11_CR38","DOI":"10.1049\/cp:20010502"},{"doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP WMLScript Crypto Library. Version 20-Jun-2001.","key":"11_CR39","DOI":"10.1049\/cp:20010502"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T20:28:41Z","timestamp":1736281721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}