{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:36Z","timestamp":1725494496227},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002895"},{"type":"electronic","value":"9783540362579"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36257-6_4","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T11:40:53Z","timestamp":1194954053000},"page":"40-45","source":"Crossref","is-referenced-by-count":0,"title":["Supporting E-commerce in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Radek","family":"Vingralek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2002,11,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"W. Arbaugh, D. Farber, and J. Smith. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy, 1997. Oakland, CA.","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"D. Aucsmith. Tamper resistant software: an implementation. InProc. International Workshop on Information Hiding, 1996. Cambridge, UK.","DOI":"10.1007\/3-540-61996-8_49"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Ionnidis, and A. Keromytis. The KeyNote trust management system, version 2 (rfc 2704), 1999.","DOI":"10.17487\/rfc2704"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy, 1996. Oakland, CA.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"F. Chang, A. Itzkovitz, and V. Karamcheti. User-level resource-constrained sandboxing. In Proceedings of the 4th USENIX Windows Systems Symposium, 2000. Seattle, WA.","DOI":"10.21236\/ADA439735"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the ACM Conference on Principles of Programming Languages, 1998. San Diego, CA.","DOI":"10.1145\/268946.268962"},{"key":"4_CR7","unstructured":"Dallas Semiconductor. DS5002FP Secure Microprocessor Chip, July 2001."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory (rfc 2693). ftp:\/\/ftp.isi.edu\/in-notes\/rfc2693.txt , 1999.","DOI":"10.17487\/rfc2693"},{"key":"4_CR9","unstructured":"I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium, 1996. San Jose, CA."},{"key":"4_CR10","unstructured":"G. Hunt and D. Brubacher. Detours: Binary interception of Win32 functions. In Proceedings of the 3rd USENIX Windows NT Symposium, 1999. Seattle, WA."},{"key":"4_CR11","unstructured":"O. Kommerling and M. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology, 1999."},{"key":"4_CR12","unstructured":"U. Maheshwari, R. Vingralek, and W. Shapiro. How to build a trusted database system on untrusted storage. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000. San Diego, CA."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"S. Smith, E. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Proceedings of the International Conference on Financial Cryptography, 1998. Anguilla, British West Indies.","DOI":"10.1007\/BFb0055474"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"J. Tual. MASSC: A generic architecture for multiapplication smart cards. IEEE Micro, 19, 1999.","DOI":"10.1109\/40.798109"}],"container-title":["Lecture Notes in Computer Science","Developing an Infrastructure for Mobile and Wireless Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36257-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:08:38Z","timestamp":1556950118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36257-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002895","9783540362579"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36257-6_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}