{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:52Z","timestamp":1725494452711},"publisher-location":"New York, NY","reference-count":8,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_8","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"74-79","source":"Crossref","is-referenced-by-count":0,"title":["The Smart Diskette A Universal User Token and Personal Crypto-Engine"],"prefix":"10.1007","author":[{"given":"Paul","family":"Barrett","sequence":"first","affiliation":[]},{"given":"Raymond","family":"Eisele","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Sherwood J. R. and Gallo V. A., \u201cThe application of smart cards for RSA digital signatures in a network comprising both interactive and store-and-forward facilities\u201d, Proc. of Crypto 88, Springer-Verlag, 1988."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Wong R., Berson T. and Feiertag R., \u201cPolonius: An identity authentication system\u201d, Proc. of IEEE symposium on secrecy and privacy, 1985.","DOI":"10.1109\/SP.1985.10001"},{"key":"8_CR3","unstructured":"Eisele R., \u201cHost access security\u201d, presented at Interact 86, Orlando, Florida, 1986."},{"key":"8_CR4","unstructured":"Sherwood J. R., \u201cDigital signature schemes using smart cards\u201d, Proc. of Smart Card 88, London, 1988."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Rivest R., Shamir A. and Adleman L., \u201cA method of obtaining digital signatures and public key cryptosystems\u201d, Comm. of ACM, Vol 21, No.2 Feb 1978.","DOI":"10.1145\/359340.359342"},{"key":"8_CR6","unstructured":"Barrett P. D., \u201cImplementing the RSA public key encryption scheme on a digital signal processor\u201d, Proc. of Crypto 86, Springer-Verlag, 1986."},{"key":"8_CR7","unstructured":"Clark A. J., \u201cPhysical protection of cryptographic devices\u201d, Eurocrypt 87, Amsterdam, 1987."},{"key":"8_CR8","unstructured":"Chorley, G.J., & Price W.L. \u201cAn intelligent token for secure transactions\u201d, Pro IFIP\/Sec\u2019 86, Monte Carlo December 1986 pp 442\u2013450."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:35Z","timestamp":1619501315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_8","relation":{},"subject":[]}}