{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T15:10:32Z","timestamp":1778253032735,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540657569","type":"print"},{"value":"9783540489702","type":"electronic"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48970-3_7","type":"book-chapter","created":{"date-parts":[[2007,3,10]],"date-time":"2007-03-10T08:36:22Z","timestamp":1173515782000},"page":"77-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On m-Permutation Protection Scheme against Modification Attack"],"prefix":"10.1007","author":[{"given":"W. W.","family":"Fung","sequence":"first","affiliation":[]},{"suffix":"III","given":"J. W.","family":"Gray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,27]]},"reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1147\/sj.302.0206","volume":"30 number","author":"D.G. Abraham","year":"1991","unstructured":"D.G. Abraham, G.M. Dolan, G.P. Double, and J.V. Stevens, \u201cTransaction Security System\u201d, in IBM Systems Journal, volume 30, number 2, (1991), p.206\u2013229.","journal-title":"IBM Systems Journal"},{"key":"7_CR2","unstructured":"R. Anderson and M. Kuhn, \u201cTamper Resistance \u2014 a Cautionary Note\u201d in Proceedings of the Second USENIX Workshop on Electronic Commerce (1996), p.1\u201311."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"R. Anderson and M. Kuhn, \u201cLow Cost Attacks on Tamper Resistant Devices\u201d, in Security Protocols: 5th International Workshop, (1997), p.125\u2013136.","DOI":"10.1007\/BFb0028165"},{"key":"7_CR4","unstructured":"F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimhalu, and T. Ngair, \u201cBreaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults\u201d, in Security Protocols: International Workshop\u2019 97"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton, \u201cOn the Importance of Checking Cryptographic Protocols for Faults\u201d, in Advances in Cryptology-EUROCRYPT\u2019 97, p.37\u201351.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, \u201cDifferential Fault Analysis of Secret Key Cryptosystems\u201d, in Advances in Cryptology-CRYPTO\u2019 97, p.513\u201325","DOI":"10.1007\/BFb0052259"},{"key":"7_CR7","unstructured":"T.H. Cormen, C.E. Leiserson and R.L. Rivest, \u201cIntroduction to Algorithms\u201d, MIT Press, 1990."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"W.W. Fung and J.W. Gray, \u201cProtection Against EEPROM Modification Attacks\u201d, in Information Security and Privacy: Third Australasian Conference, ACISP\u201998, 1998, p.250\u2013260.","DOI":"10.1007\/BFb0053738"},{"key":"7_CR9","unstructured":"M.R. Garey and D.S. Johnson, \u201cComputers and Intractability\u201d, W.H. Freeman & Co., 1979."},{"issue":"2","key":"7_CR10","first-page":"7","volume":"6","author":"C.E. Shannon","year":"1990","unstructured":"C.E. Shannon, \u201cCommunication Theory of Secrecy System\u201d, in Computer Security Journal Vol.6, No.2, 1990, p.7\u201366.","journal-title":"Computer Security Journal"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48970-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T14:19:31Z","timestamp":1778249971000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/3-540-48970-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540657569","9783540489702"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48970-3_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"27 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}