{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:07Z","timestamp":1725475807340},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_11","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"123-133","source":"Crossref","is-referenced-by-count":0,"title":["Securing Large E-Commerce Networks"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Sklavos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aggelos","family":"Varvitsiotis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Despina","family":"Polemi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Adams, C., Chain, P., Pinkas, D., Zuccherato, R.: Internet Public Key Infrastructure, Part V: Timestamp protocols, PKIX Working Group Draft (March 1998)"},{"key":"11_CR2","unstructured":"ACTS\/SEMPER Project Secure Electronic Market Place for Europe (1995)"},{"key":"11_CR3","unstructured":"ANSI X3.92 Data Encryption Standard"},{"key":"11_CR4","volume-title":"Network & Internet Security","author":"V. Ahuja","year":"1996","unstructured":"Ahuja, V.: Network & Internet Security. Academic Press, New York (1996)"},{"key":"11_CR5","unstructured":"Architecture for Public Key Infrastructure (APKI), Draft 1, The Open Group (May 1997)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Camp, L.J., Sirbu M.: Critical Issues in Internet Commerce. IEEE Communications Magazine 58\u201362 (1997)","DOI":"10.1109\/35.592096"},{"key":"11_CR7","unstructured":"CEN\/CENELEC\/ETSI ITAEGV\/N231, M-IT-06, Taxonomy and Directory of European Standardization Requirements for Information Systems Security, Issue 2.1 (October 1994)"},{"key":"11_CR8","unstructured":"Colleran, A.: Standardization Issues for the European Trusted Services - ETS, Quercus Information (May 1997)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Communications of the ACM Special Issue: Electronic Commerce, vol. 39(6) (June 1996)","DOI":"10.1145\/228503.228512"},{"key":"11_CR10","unstructured":"COMPUTER Network Security. Special Issue vol. 31(9) (1998)"},{"key":"11_CR11","unstructured":"Froomkin, A.: The Essential Role of Trusted Third Parties in Electronic Commerce (October 1996)"},{"key":"11_CR12","unstructured":"Goodman, D., Robbins, C.: Understanding LDAP & X.500 (September 1998)"},{"key":"11_CR13","volume-title":"Technology and Privacy: The New Landscape","author":"P. Gre","year":"1998","unstructured":"Gre, P., Rotenberg, M.: Technology and Privacy: The New Landscape. MIT Press, Cambridge (1998)"},{"key":"11_CR14","unstructured":"INFOSEC\/ETS II\/BESTS Project Business Environment Study of Trusted Services (1998)"},{"key":"11_CR15","unstructured":"INFOSEC\/ETS 1996: Legal, Ethical & Regulatory Issues concerning the TTPs and Digital Signatures"},{"key":"11_CR16","unstructured":"INFOSEC\/TTP Project, Trusted Third Party Services: Functional Model, Muller, P. (ed.), Ver. 1.1, Bull Ingenierie, France (December 1993)"},{"key":"11_CR17","unstructured":"ISO\/IEC 10118-2:92 Hash Function for digital signatures Part2: Hash Functions using a symmetric block-cipher algorithm"},{"key":"11_CR18","unstructured":"ISO\/IEC 9796:91 Information Technology- Security Techniques-Digital Signature Scheme giving message recovery"},{"key":"11_CR19","unstructured":"IEC DIS 11577 Network Layer Security Protocol"},{"key":"11_CR20","unstructured":"IEC DIS 9594-8 X.509 The Directory Authentication Framework"},{"key":"11_CR21","unstructured":"ISO\/IEC JTC 1\/SC27 N691, Guidelines on the use and management of Trusted Third Party Services (August 1993)"},{"key":"11_CR22","unstructured":"ISO\/IEC JTC1\/SC27\/WG2 Security Techniques, Security Mechanisms DIS 9796"},{"key":"11_CR23","unstructured":"ISO\/IEC X.509 RSA Public Key Certificates"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS 10 Certification Request Syntax Standard. RFC 2314 (March 1998)","DOI":"10.17487\/rfc2314"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS 7 Cryptographic Message Syntax Standard. RFC 2314 (March 1998)","DOI":"10.17487\/rfc2315"},{"key":"11_CR26","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Meyers, M., et al.: X.509 Internet Public Key Infrastracture On Line Certificate Status Protocol (OSCP) (June 1999)","DOI":"10.17487\/rfc2560"},{"issue":"6","key":"11_CR28","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/0167-4048(91)90076-P","volume":"10","author":"S.L. Pfleeger","year":"1991","unstructured":"Pfleeger, S.L.: A Framework for Security Requirements. Computers and Security\u00a010(6), 515\u2013523 (1991)","journal-title":"Computers and Security"},{"key":"11_CR29","unstructured":"Polemi, D.: Securing E-Commerce. Proceedings of the International e-Commerce Conference, IECC 1999 (1999)"},{"key":"11_CR30","volume-title":"Applied Cryptography, Protocols, Algorithms and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, Protocols, Algorithms and Source Code in C, 2nd edn. J. Wiley and Sons Inc., Chichester (1996)","edition":"2"},{"key":"11_CR31","volume-title":"Contemporary cryptography: The science of information integrity","author":"G.J. Simmons","year":"1992","unstructured":"Simmons, G.J.: Contemporary cryptography: The science of information integrity. IEEE Press, Los Alamitos (1992)"},{"key":"11_CR32","volume-title":"Network and Internet Security: Principles and Practice","author":"W. Stallings","year":"1995","unstructured":"Stallings, W.: Network and Internet Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)"},{"key":"11_CR33","unstructured":"The Burton Group, Public Key Infrastructure. Network Stratege Report (1997)"},{"key":"11_CR34","unstructured":"Telematics Engineering\/ICE-TEL Project, Architecture and General Specifications of the Public Key Infrastructure, COST (September 1996)"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Dierks, T., et al.: The TLS Protocol v.1.0 (June 1999)","DOI":"10.17487\/rfc2246"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Fielding, R., et al.: Hypertext Transfer Protocol\u2014HTTP\/1.1 (June 1999)","DOI":"10.17487\/rfc2616"},{"key":"11_CR37","unstructured":"Open Secure Certificate Architecture (OSCAR), Security Unit, Distributed Systems Technology Centre, Australia http:\/\/oscar.dstc.qut.edu.au"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T04:14:52Z","timestamp":1628309692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/10718964_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}