{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:35:19Z","timestamp":1725492919286},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423133"},{"type":"electronic","value":"9783540477495"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47749-7_13","type":"book-chapter","created":{"date-parts":[[2007,10,20]],"date-time":"2007-10-20T10:57:32Z","timestamp":1192877852000},"page":"164-176","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Enhancement on Mobile Commerce"],"prefix":"10.1007","author":[{"given":"Eun-Kyeong","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Yong-Gu","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Ki-Joon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,10]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"WAP Forum: Wireless Application Protocol Architecture Specification, version 1.2, WAP Forum (1998)","DOI":"10.4102\/sajim.v1i4.76"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen: The TLS Protocol Version 1.0, RFC2246 (1999)","DOI":"10.17487\/rfc2246"},{"key":"13_CR3","unstructured":"Understanding Security on the Wireless Internet, Phone.com (2000)"},{"key":"13_CR4","unstructured":"WAP Forum: Wireless Transport Layer Security Specification, version 1.2 (1999)"},{"key":"13_CR5","unstructured":"Martin Christinat, Markus Lsler: WTLS-The security layer in the WAP stack, keyon (2000)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, R. Canetti: HMAC: Keyed-Hashing for Message Authentication, RFC2104 (1997)","DOI":"10.17487\/rfc2104"},{"key":"13_CR7","volume-title":"Cryptography Theory and Practice","author":"D. Stinson","year":"1995","unstructured":"D. Stinson: Cryptography Theory and Practice, CRC Press, Boca Raton (1995)"},{"key":"13_CR8","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1995","unstructured":"B. Schneier: Applied Cryptography, 2nd ed., Wiley, New York (1995)","edition":"2nd ed."}],"container-title":["Lecture Notes in Computer Science","The Human Society and the Internet Internet-Related Socio-Economic Issues"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47749-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T04:40:49Z","timestamp":1587962449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47749-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423133","9783540477495"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-47749-7_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"10 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}