{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:22:13Z","timestamp":1725560533250},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_114","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T09:48:30Z","timestamp":1127814510000},"page":"1094-1104","source":"Crossref","is-referenced-by-count":0,"title":["RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols"],"prefix":"10.1007","author":[{"given":"Ping","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lalin","family":"Jiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiayin","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"114_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G.: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. In: Proc. ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 138\u2013146 (1999)","DOI":"10.1145\/319709.319728"},{"key":"114_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-49649-1_23","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L. Chen","year":"1998","unstructured":"Chen, L.: Efficient Fair Exchange with Verifiable Confirmation of Signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 286\u2013299. Springer, Heidelberg (1998)"},{"key":"114_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/ITCC.2004.1286420","volume-title":"Proceedings of IEEE International Conference on Information Technology, Coding and Computing (ITCC 2004) - Information Assurance and Security Track","author":"A. Nenadic","year":"2004","unstructured":"Nenadic, A., Zhang, N., Barton, S.: A Security Protocol for Certified E-Goods Delivery. In: Proceedings of IEEE International Conference on Information Technology, Coding and Computing (ITCC 2004) - Information Assurance and Security Track, pp. 22\u201328. IEEE Computer Society, Las Vegas (2004)"},{"issue":"07","key":"114_CR4","first-page":"1049","volume":"15","author":"Y.B. Zhou","year":"2004","unstructured":"Zhou, Y.B., Zhang, Z.F., Qing, S.H., Ji, Q.G.: A Fair Exchange Protocol Based on RSA Signature Scheme. Journal of Software\u00a015(07), 1049\u20131055 (2004)","journal-title":"Journal of Software"},{"key":"114_CR5","doi-asserted-by":"crossref","unstructured":"Franklin, M., Reiter, M.: Fair Exchange with a Semi-Trusted Third Party. In: Proc. ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 1\u20135 (1997)","DOI":"10.1145\/266420.266424"},{"key":"114_CR6","unstructured":"Bao, F., Deng, R.: An Efficient Fair Exchange Protocol with an Off-Line Semi-Trusted Third Party. In: Proc. International Workshop on Cryptographic Techniques and E-Commerce, pp. 37\u201347 (1999)"},{"key":"114_CR7","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)"},{"key":"114_CR8","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Publishing House of Electronics Industry (2004)"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:26:24Z","timestamp":1558283184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11534310_114","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}