{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:42Z","timestamp":1725490602468},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001645"},{"type":"electronic","value":"9783540361596"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36159-6_36","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T10:06:48Z","timestamp":1188295608000},"page":"422-433","source":"Crossref","is-referenced-by-count":4,"title":["A Secure Agent-Mediated Payment Protocol"],"prefix":"10.1007","author":[{"given":"Xiaolin","family":"Pang","sequence":"first","affiliation":[]},{"given":"Kian-Lee","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"36_CR1","unstructured":"URL: \n                    http:\/\/www.netscape.com\/eng\/ssl3\/ssl-toc.html"},{"key":"36_CR2","unstructured":"URL: \n                    http:\/\/www.terisa.com\/shttp\/current.txt"},{"key":"36_CR3","unstructured":"VISA INTERNATIONAL, and MASTERCARD INTERNATIONAL. Secure Electronic Transaction (SET) Specification. Version 1.0, (1997)"},{"key":"36_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/BFb0053403","volume-title":"TREC\u201998","author":"A. Romao","year":"1998","unstructured":"Romao, A., M. M. da. Sliva: \u201cAn agent-based secure Internet payment system for mobile computing\u201d, TREC\u201998, LNCS 1402, (1998) 80\u201393"},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/A:1008735301014","volume":"8","author":"X. Yi","year":"2000","unstructured":"Yi, X., Siew, C. K., Wang, X. F., Okamoto, E.: \u201cA secure Agent-based Framework for the Internet Trading in Mobile Computing Environments\u201d, in Distributed and Parallel Databases, 8. (2000) 85\u2013117","journal-title":"Distributed and Parallel Databases"},{"key":"36_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/BFb0053735","volume-title":"Proc. ACISP\u201998","author":"G. Hanaoka","year":"1998","unstructured":"Hanaoka, G., Zheng, Y., Imai, H.: \u201cLITESET: a light-weight secure electronic transaction protocol\u201d, Proc. ACISP\u201998, Lecture Notes in Computer Science, vol. 1438. Springer-Verlag. (1998) 215\u2013226"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., Adleman, L.: \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, 21. (1978) 120\u2013126","journal-title":"Communications of the ACM"},{"key":"36_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/10718964_24","volume-title":"ACISP 2000","author":"P. Kotzanikolaou","year":"2000","unstructured":"Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: \u201cSecure Transactions with Mobile Agents in Hostile Environments\u201d, ACISP 2000, LNCS 1841. (2000) 289\u2013297"},{"key":"36_CR9","unstructured":"Romao, A., Sliva, M. M. da.: \u201cSecure mobile agent digital signatures with proxy certificates\u201d, E-Commerce Agents, LNAI 2033. (2001) 206\u2013220"},{"key":"36_CR10","unstructured":"Stinson, D. R.: \u201cSecret Sharing Schemes\u201d, Cryptography-Theory and Practice, CRC Press. (1995) 326\u2013331"},{"key":"36_CR11","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: \u201cThreshold Schemes\u201d, Handbook of Applied Cryptography, CRC Press. (1996)"},{"key":"36_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/BFb0030430","volume-title":"Information Security Workshop (ISW\u2019 97)","author":"Y. Zheng","year":"1998","unstructured":"Zheng, Y.: \u201cSigncryption and Its Applications in Efficient Public Key Solutions\u201d, Information Security Workshop (ISW\u2019 97), Springer-Verlag, LNCS 1397. (1998) 291\u2013312"},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume":"1294","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: \u201cDigital Signcryption or How to Achieve Cost (Signature& Encryption)<<Cost (Signature)+Cost (Encryption), in Advances in Cryptology-CRYPO\u201997, vol 1294. Springer-Verlag. (1997) 165\u2013179","journal-title":"Advances in Cryptology-CRYPO\u201997"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: \u201cProxy Signatures for Delegating Signing operation\u201d, Proc.Third ACM Conf. On Computer and Communications Security. (1996) 48\u201357","DOI":"10.1145\/238168.238185"},{"key":"36_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Proc. Of ICICS\u201997, International Conference on Information and Communications Security","author":"S. Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: \u201cProxy signatures, Revisited\u201d, Proc. Of ICICS\u201997, International Conference on Information and Communications Security, LNCS1334, Springer-Verlag. (1997) 223\u2013232"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36159-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T00:37:57Z","timestamp":1550882277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36159-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001645","9783540361596"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36159-6_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}