{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:30:08Z","timestamp":1725471008945},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377436"},{"type":"electronic","value":"9783540377450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11823865_16","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T11:16:52Z","timestamp":1158578212000},"page":"152-161","source":"Crossref","is-referenced-by-count":0,"title":["CerTicket Solution: Safe Home-Ticketing Through Internet"],"prefix":"10.1007","author":[{"given":"F.","family":"Rico","sequence":"first","affiliation":[]},{"given":"J.","family":"Forga","sequence":"additional","affiliation":[]},{"given":"E.","family":"Sanvicente","sequence":"additional","affiliation":[]},{"given":"L.","family":"de la Cruz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Kobayashi, N., Bennet, Y.: System and method for delivering and examining digital tickets. Patent WO0074300"},{"key":"16_CR2","unstructured":"William, B.: Apparatus and method for issuing and validating tickets. Patent US5598477"},{"key":"16_CR3","unstructured":"Orens, G.: Method and device for delivery and use of a document opposable to third parties. Patent WO0161577"},{"key":"16_CR4","volume-title":"Security Engineering","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering. John Wiley & Sons, Chichester (2001)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Khun, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11823865_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T14:37:14Z","timestamp":1552315034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11823865_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377436","9783540377450"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11823865_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}