{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:21Z","timestamp":1725459861784},"publisher-location":"Boston, MA","reference-count":27,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_19","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"287-302","source":"Crossref","is-referenced-by-count":1,"title":["Checking and Signing XML Documents on Java Smart Cards"],"prefix":"10.1007","author":[{"given":"Nils","family":"Gruschka","sequence":"first","affiliation":[]},{"given":"Florian","family":"Reuter","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Luttenberger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Mark Bartel et al. XML-Signatur Syntax and Processing-W3C Recommendation 12 February 2002. W3C (World Wide Web Consortium), 2002."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"John Boyer. Canonical XML, Version 1.0-W3C Recommendation 15 March 2001. W3C (World Wide Web Consortium), 2001.","DOI":"10.17487\/rfc3076"},{"key":"19_CR3","unstructured":"Armin B. Cremers, Adrian Spalka, and Hanno Langweg. The Fairy Tale of \u2018What You See Is What You Sign\u2019-Trojan Horse Attacks on Software for Digital Signatures. In IFIP Working Conference on Security and Control of IT in Society-II (SCITS-II), Bratislava, Slovakia, June 2001."},{"issue":"6","key":"19_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644\u2013654, November 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR5","unstructured":"Henry S. Thompson et al. XML Schema Part 1: Structures-W3C Recommendation 2 May 2001. W3C (World Wide Web Consortium), 2001."},{"key":"19_CR6","unstructured":"Paul V. Biron and Ashok Malhotra. XML Schema Part 2: Datatypes-W3C Recommendation 2 May 2001. W3C (World Wide Web Consortium), 2001."},{"key":"19_CR7","unstructured":"James Clark, Steve DeRose. XML Path Language (XPath)-W3C Recommendation 16 November 1999. W3C (World Wide Web Consortium), 2001."},{"key":"19_CR8","unstructured":"Tim Redhead and Dean Povey. The Problem with Secure On-Line Banking. In Proceedings of the XVIIth annual South East Asia Regional Conference (SEARCC\u201998), July 1998"},{"key":"19_CR9","first-page":"509","volume":"1430","author":"A. Weber","year":"1998","unstructured":"Arnd Weber. See What You Sign. Secure Implementation of Digital Signatures. In Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services (IS&N\u201998), Springer-Verlag LNCS 1430, 509\u2013520, Berlin, 1998.","journal-title":"LNCS"},{"key":"19_CR10","unstructured":"Audun J\u00f8sang, Dean Povey, and Authony Ho. What You See is Not Always What You Sign. AUUG 2002-Measure, Monitor, Control, September 2002"},{"key":"19_CR11","unstructured":"Tim Bray et al. Extensible Markup Language (XML) 1.0 (Third Edition) W3C Recommendation 04 February 2004. W3C (World Wide Web Consortium), 2004."},{"key":"19_CR12","unstructured":"John Cowan, Richard Tobin. XML Information Set (Second Edition) W3C Recommendation 4 February 2004. W3C (World Wide Web Consortium), 2004."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"P. Buneman. Semistructured data. Tutorial in Proceedings of the 16th ACM Symposium on Principles of Database Systems, 1997","DOI":"10.1145\/263661.263675"},{"key":"19_CR14","unstructured":"Hiroshi Maruyama et al. XML and Java: developing Web applications. Pearson Education. 2nd ed. 2002."},{"key":"19_CR15","unstructured":"Makoto Murata, Dongwon Lee, and Murali Mani. Taxonomy of XML Schema Languages using Formal Language Theory. Extreme Markup Languages 2000, August 13\u201314, 2000. Montreal, Canada."},{"key":"19_CR16","unstructured":"Boris Chidlovskii. Using Regular Tree Automata as XML Schemas. IEEE Advances in Digital Libraries 2000 (ADL 2000). May 22\u201324, 2000. Washington, D.C."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"F. Neven. Automata theory for XML researchers. SIGMOD Record, 31(3), 2002.","DOI":"10.1145\/601858.601869"},{"key":"19_CR18","unstructured":"The SAX Project, URL: \n                    http:\/\/www.saxproject.org\/"},{"key":"19_CR19","unstructured":"IBM JCOP embedded security software. URL: \n                    http:\/\/www.zurich.ibm.com\/jcop\/"},{"key":"19_CR20","unstructured":"Sun Microsystems: JavaCard 2.1.1 \n                    http:\/\/java.sun.com\/products\/javacard"},{"key":"19_CR21","unstructured":"Global Platform Consortium: OpenPlatform 2.0.1\u2019. URL: \n                    http:\/\/www.globalplatform.org\/"},{"key":"19_CR22","unstructured":"FIPS PUB 140-2: Security Requirements For Cryptographic Modules, May 2001. URL: \n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf"},{"key":"19_CR23","unstructured":"JSR 173: Streaming API for XML. Java Community Process."},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Janusz A: Brzozowski. Derivatives of regular expressions. Journal of the ACM, 11(4), 1964.","DOI":"10.1145\/321239.321249"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Ronald Rivest: The MD5 Message-Digest Algorithm, IETF RFC 1321, April 1992. URL: \n                    http:\/\/www.ietf.org\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"19_CR26","unstructured":"National Institute of Standards and Technology: Secure Hash Standard, April 1995. URL: \n                    http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm"},{"key":"19_CR27","unstructured":"FINREAD. URL: \n                    http:\/\/www.finread.com\/"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T15:50:24Z","timestamp":1578498624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_19"}},"subtitle":["Challenges and Opportunities"],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_19","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}