{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:04:17Z","timestamp":1742979857585,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009476"},{"type":"electronic","value":"9783319009483"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-00948-3_1","type":"book-chapter","created":{"date-parts":[[2013,7,19]],"date-time":"2013-07-19T01:16:13Z","timestamp":1374196573000},"page":"1-15","source":"Crossref","is-referenced-by-count":0,"title":["Security Certification Model for Mobile-Commerce"],"prefix":"10.1007","author":[{"given":"Haeng-Kon","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"The Napster.com home page, \n                    http:\/\/www.napster.com"},{"key":"1_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-45370-9_16","volume-title":"E-Commerce Agents","author":"S. Chari","year":"2001","unstructured":"Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security Issues in M-Commerce: A Usage-Based Taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol.\u00a02033, pp. 264\u2013282. Springer, Heidelberg (2001)"},{"key":"1_CR3","unstructured":"RFC: 2560 X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1996)"},{"key":"1_CR4","unstructured":"W3C, Extensible Markup Language (XML) (1998), \n                    http:\/\/www.w3c.org\/XML"},{"key":"1_CR5","unstructured":"XML Signature Requirements WD, W3C Working Draft (October 1999), \n                    http:\/\/www.w3.org"},{"key":"1_CR6","unstructured":"Cho, K.M.: Framework of Content Distribution in Mobile Network Environment. In: Proc. the 2003 International Conference on Internet Computing (IC 2003), pp. 429\u2013434 (2003)"},{"key":"1_CR7","unstructured":"http:\/\/www.roseindia.net\/services\/m-commerce\/mobile-commerce.shtml"},{"key":"1_CR8","unstructured":"XML-Signature Syntax and Processing, W3C Recommendation (February 2002), \n                    http:\/\/www.w3c.org"},{"key":"1_CR9","unstructured":"XML Encryption Syntax and Processing, W3C Working Draft (October 2001), \n                    http:\/\/www.w3c.org"},{"key":"1_CR10","unstructured":"Decryption Transform for XML Signature, W3C Working Draft (October 2001), \n                    http:\/\/www.w3c.org"},{"key":"1_CR11","unstructured":"Takase, T., et al.: XML Digital Signature System Independent Existing Applications. In: Proc. the 2002 Symposium on Application and the Internet, pp. 150\u2013157 (2002)"},{"key":"1_CR12","unstructured":"Xavier, E.: XML based Security for E-Commerce Applications. In: Eighth Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 10\u201317 (2001)"},{"key":"1_CR13","unstructured":"Cho, K.M.: Packaging Strategies of Multimedia Content in DRM. In: Proc. the 2003 International Conference on Internet Computing (IC 2003), pp. 243\u2013248 (2003)"},{"issue":"5","key":"1_CR14","first-page":"93","volume":"7","author":"K.M. Cho","year":"2004","unstructured":"Cho, K.M.: Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce. The Journal of Korean Association of Computer Education\u00a07(5), 93\u201399 (2004)","journal-title":"The Journal of Korean Association of Computer Education"}],"container-title":["Studies in Computational Intelligence","Software Engineering Research, Management and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00948-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:23:24Z","timestamp":1676820204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00948-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319009476","9783319009483"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00948-3_1","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014]]}}}