{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:03:39Z","timestamp":1725890619790},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540023548"},{"type":"electronic","value":"9783540369011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36901-5_27","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:32:09Z","timestamp":1187163129000},"page":"263-274","source":"Crossref","is-referenced-by-count":2,"title":["Verifying the Purchase Request in SET Protocol"],"prefix":"10.1007","author":[{"given":"Qingfeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shichao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chunsheng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,4,15]]},"reference":[{"key":"27_CR1","unstructured":"http:\/\/www.idc.com"},{"issue":"12","key":"27_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham R. and Schroeder M., Using Excryption for Authentication in Large Networks of Computers. Comm. of the ACM, 21(12), pages 993\u2013999, Dec 1978.","journal-title":"Comm. of the ACM"},{"issue":"8","key":"27_CR3","first-page":"695","volume":"22","author":"S. Gritizalis","year":"1999","unstructured":"Gritizalis S., Security Protocols over Open networks and distributed systems: Formal methods for their Analysis, Design, and Verification, Computer Communications, 22(8), pages 695\u2013707, May 1999.","journal-title":"Computer Communications"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev D, Yao A., On the Security of Public Key Protocols. IEEE Transaction on Information Theory, 29(2), pages 198\u2013208, 1983","journal-title":"IEEE Transaction on Information Theory"},{"issue":"2","key":"27_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, 26(2), pages 113\u2013131, 1996.","journal-title":"Journal of Logic Programming"},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows M., Abadi M., Needham R., A logic for Authentication. ACM Transactions on Computer Systems, 8(1):18\u201336, February 1990.","journal-title":"ACM Transactions on Computer Systems"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Gong L, Needham R, and Yahalom R., Reasoning about belief in cryptographic protocols. Proceeding of the Symposium on Security and Privacy, pages 234\u2013248, Oakland, CA, May 1990.","DOI":"10.1109\/RISP.1990.63854"},{"issue":"2","key":"27_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, 26(2), pages 113\u2013131, 1996.","journal-title":"Journal of Logic Programming"},{"key":"27_CR9","unstructured":"Brackin S., Automatic formal analyses of two large commercial protocols. Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997."},{"key":"27_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/BFb0055477","volume-title":"Proceedings of Financial Cryptography 98","author":"C. Meadows","year":"1998","unstructured":"Meadows C, Syverson P., A formal specification of requirements for payment transactions in the SET protocol. Proceedings of Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer-Verlag, pages 122\u2013140, 1998."},{"key":"27_CR11","unstructured":"SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0, May 31, 1997."},{"key":"27_CR12","unstructured":"SET Secure Electronic Transaction Specification, Book 2: Programmer\u2019s Guide, Version 1.0, May 31, 1997."},{"key":"27_CR13","unstructured":"SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, 1.0, May 31, 1997."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Chen Q.F, Zhang C.Q, Zhang S.C., A Logical Framework ENDL for Verifying Secure Transaction Protocols. Journal of Knowledge and Information Systems, Springer, accepted, forthcoming.","DOI":"10.1007\/s10115-003-0127-4"},{"key":"27_CR15","unstructured":"Chen Q.F, Zhang C.Q, Lu J., The Verification of Merchant Registration in SET Protocol, Proceedings of The International Conference on Internet omputing, Las Vegas, pages 1098\u20131104, 2002."},{"key":"27_CR16","unstructured":"Chen Q.F, Zhang C.Q., Using ENDL to Verify Cardholder Registration in SET Protocol, Proceeding of International Conference on e-Business (ICEB2002), Beijing, pages 616\u2013623, 2002."},{"issue":"8","key":"27_CR17","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning D., Sacco G., Timestamp in Key Distribution Protocols, Communications of ACM, 24(8), 533\u2013536, August 1981.","journal-title":"Communications of ACM"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36901-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T21:29:47Z","timestamp":1550784587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36901-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540023548","9783540369011"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36901-5_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}