{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:03Z","timestamp":1725488283174},"publisher-location":"New York, NY","reference-count":24,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_34","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"484-496","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities"],"prefix":"10.1007","author":[{"given":"J. R.","family":"Sherwood","sequence":"first","affiliation":[]},{"given":"V. A.","family":"Gallo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"34_CR1","unstructured":"Anura GURUGE, \u201cSNA-Theory and Practice\u201d, Pergamon Infotech, 1984"},{"key":"34_CR2","unstructured":"\u201cIBM Cryptographic Subsystem Concepts and Facilities\u201d, (GC22-9063), 1985"},{"key":"34_CR3","unstructured":"\u201cIBM RACF\u201d, Datapro Reports on Information Security, Report No. IS52-504, McGraw Hill, 1987"},{"key":"34_CR4","unstructured":"\u201cCA-ACF2\u201d, Datapro Reports on Information Security, Report No. IS52-187, McGraw Hill, 1988"},{"key":"34_CR5","unstructured":"\u201cIBM 3848 Cryptographic Unit Product Description and Operating Procedures\u201d, (GA22-7073), 1982"},{"key":"34_CR6","unstructured":"\u201cIBM OS\/VSI and OS\/VS2 MVS Programmed Cryptographic Facility, General Information\u201d, (GC28-0942), 1980"},{"key":"34_CR7","unstructured":"\u201cACF\/VTAM General Information\u201d, (GC38-0254), 1980"},{"key":"34_CR8","unstructured":"Andrew CLARK, \u201cPhysical Protection of Cryptographic Devices\u201d, Eurocrypt\u2019 87, Amsterdam, 1987"},{"key":"34_CR9","unstructured":"Andrew CLARK, \u201cPhysical Protection of Cryptographic Devices (Revised)\u201d, Proc. of Corporate Computer Security\u2019 88 Conference, Brighton, UK 1988"},{"key":"34_CR10","unstructured":"\u201cInformation Processing-Data Encryption Algorithm\u201d, ANSI X3.92, 1981"},{"key":"34_CR11","unstructured":"\u201cData Encryption Algorithm-Modes of Operation\u201d, ANSI X3.106, 1983"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Ronald RIVEST, Adi SHAMIR and Leonard ADLEMAN, \u201cA Method of Obtaining Digital Signatures and Public Key Cryptosystems\u201d, Comm. of ACM, Vol.21, No.2 Feb 1978","DOI":"10.1145\/359340.359342"},{"key":"34_CR13","unstructured":"John SHERWOOD, \u201cDigital Signature Schemes Using Smart Cards\u201d, Proc. of Smart Card\u2019 88 Conference, London, 1988"},{"key":"34_CR14","unstructured":"John SHERWOOD, \u201cAutomatic Key Management for Transparent Security on Corporate Data Networks\u201d, Proc. of International Systems Security Conference, London, 1986"},{"key":"34_CR15","unstructured":"Paul BARRETT, \u201cImplementing the RSA Public Key Encryption Scheme on a Digital Signal Processor\u201d, Proc. of Crypto\u2019 86, Springer-Verlag, 1986"},{"key":"34_CR16","unstructured":"Amos FIAT and Adi SHAMIR, \u201cHow to prove yourself: Practical Solutions to Identification and Signature Problems\u201d, Proc. of Crypto\u2019 86, Springer-Verlag, 1986"},{"key":"34_CR17","unstructured":"Amos FIAT and Adi SHAMIR, \u201cUnforgeable Proofs of Identity\u201d, 5th SECURICOM, Paris, 1987"},{"key":"34_CR18","unstructured":"Tsutomu MATSUMOTO, Koki KATO and Hideki IMAI, \u201cSpeeding-Up Secret Computations with Insecure Auxiliary Devices\u201d, CRYPTO\u2019 88-to appear"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Raymond WONG, Thomas BERSON and Richard FEIERTAG, \u201cPolonius: An Identity Authentication System\u201d, Proc. of IEEE Symposium on Security and Privacy, 1985","DOI":"10.1109\/SP.1985.10001"},{"key":"34_CR20","unstructured":"Carl MEYER and Stephen MATYAS, \u201cCryptography: A New Dimension in Computer Data Security\u201d, Wiley, 1982"},{"key":"34_CR21","unstructured":"Raymond EISELE, \u201cHost Access Security\u201d, Presented at Interact\u2019 86, Orlando, Florida, 1986"},{"key":"34_CR22","unstructured":"Vince GALLO and Andrew CLARK, \u201cIssue Authority\u201d, 2nd Nordic Conference on Information Security, Stockholm, 1988"},{"key":"34_CR23","unstructured":"\u201cFinancial Institution Key Management (Wholesale)\u201d, ANSI X9.17, 1985"},{"key":"34_CR24","unstructured":"\u201cFinancial Institution Message Authentication (Wholesale)\u201d, ANSI X9.9, 1984"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T15:24:56Z","timestamp":1576164296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}