{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:37Z","timestamp":1725488737282},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_11","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T08:21:49Z","timestamp":1186820509000},"page":"90-94","source":"Crossref","is-referenced-by-count":2,"title":["A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce"],"prefix":"10.1007","author":[{"given":"Kanta","family":"Matsuura","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/12.737682","volume":"47","author":"M. K. Reiter","year":"1998","unstructured":"Reiter, M. K., Stubblebine, S. G.: Resilient Authentication Using Path Independence. IEEE Trans. Comput. 47 (1998) 1351\u20131362","journal-title":"IEEE Trans. Comput"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/65.768484","volume":"13","author":"X. Xiao","year":"1999","unstructured":"Xiao, X., Ni, L. M.: Internet QoS: A Big Picture. IEEE Network. 13 (1999) 8\u201318","journal-title":"IEEE Network"},{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","key":"11_CR3","unstructured":"Katzenbeisser, S., Petitcolas, F. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, Boston London (2000)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/317087.317088","volume":"2","author":"M. K. Reiter","year":"1999","unstructured":"Reiter, M. K., Stubblebine, S. G.: Authentication Metric Analysis and Design. ACM Trans. Info. & Sys. Security 2 (1999) 138\u2013158","journal-title":"ACM Trans. Info. & Sys. Security"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1086\/260062","volume":"81","author":"F. Black","year":"1973","unstructured":"Black, F., Scholes, M.: The Pricing of Options and Corporate Liabilities. J. Political Econ. 81 (1973) 637\u2013654","journal-title":"J. Political Econ"},{"key":"11_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/BFb0053446","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"T. Eng","year":"1995","unstructured":"Eng, T., Okamoto, T.: Single-Term Divisible Electronic Coins. In: De Santis, Alfredo (ed.): Advances in Cryptology \u2014 EUROCRYPT\u201994. Lecture Notes in Computer Science, Vol. 950. Springer-Verlag, Berlin Heidelberg New York (1995) 306\u2013319"},{"key":"11_CR7","doi-asserted-by":"crossref","DOI":"10.1093\/0198775180.001.0001","volume-title":"Arbitrage Theory in Continuous Time","author":"T. Bj\u00f6rk","year":"1998","unstructured":"Bj\u00f6rk, T.: Arbitrage Theory in Continuous Time. Oxford University Press, New York (1998)"},{"key":"11_CR8","unstructured":"Matsuura, K.: Security Tokens and Their Derivatives. Technical Reports, Centre for Communication Systems Research, University of Cambridge (2001) \n                  http:\/\/www.ccsr.cam.ac.uk\/techreports\/tr29\/index.html"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0304-405X(76)90022-2","volume":"3","author":"R. C. Merton","year":"1976","unstructured":"Merton, R. C.: Option Pricing When Underlying Stock Returns are Discontinuous. J. Financial Econ. 3 (1976) 125\u2013144","journal-title":"J. Financial Econ"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/2977928","volume":"19","author":"W. F. Sharpe","year":"1964","unstructured":"Sharpe, W. F.: Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk. J. Finance 19 (1964) 425\u2013442","journal-title":"J. Finance"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1111\/j.1467-9965.1993.tb00046.x","volume":"3","author":"D. B. Colwell","year":"1993","unstructured":"Colwell, D. B., Elliott, R. J.: Discontinuous Asset Prices and Non-Attainable Contingent Claims. Math. Finance 3 (1993) 295\u2013308","journal-title":"Math. Finance"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1086\/296267","volume":"57","author":"R. A. Jarrow","year":"1984","unstructured":"Jarrow, R. A., Rosenfeld, E. R.: Jump Risks and the Intertemporal Capital Asset Pricing Model. J. Business 57 (1984) 337\u2013351","journal-title":"J. Business"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Buldas, A., Laud, P., Lipmaa, H.: Accountable Certificate Management Using Undeniable Attestations. In: Proc. 7th ACM Conf. on Comp. & Comm. Security, Athens (2000) 9\u201318","DOI":"10.1145\/352600.352604"},{"key":"11_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-540-46588-1_23","volume-title":"Public Key Cryptography \u2014 PKC 2000","author":"I. Gassko","year":"2000","unstructured":"Gassko, I., Gemmell, P. S., MacKenzie, P.: Efficient and Fresh Certification. In: Imai, H., Zheng, Y. (eds.): Public Key Cryptography \u2014 PKC 2000. Lecture Notes in Computer Science, Vol. 1751. Springer-Verlag, Berlin Heidelberg New York (2000) 342\u2013353"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T03:14:26Z","timestamp":1550718866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45600-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}