{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:25:04Z","timestamp":1743157504193,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_33","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"340-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond Trust"],"prefix":"10.1007","author":[{"given":"Partha","family":"Das Chowdhury","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Christianson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"issue":"4","key":"33_CR1","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s13347-013-0128-5","volume":"26","author":"B Christianson","year":"2013","unstructured":"Christianson, B.: Living in an impossible world. Philos. Technol. 26(4), 411\u2013429 (2013)","journal-title":"Philos. Technol."},{"key":"33_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-540-77156-2_39","volume-title":"Security Protocols","author":"P Das Chowdhury","year":"2007","unstructured":"Das Chowdhury, P., Christianson, B., Malcolm, J.A.: Anonymous context based role activation mechanism. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 315\u2013321. Springer, Heidelberg (2007)"},{"key":"33_CR3","volume-title":"Thinking Strategically","author":"A Dixit","year":"1991","unstructured":"Dixit, A., Nalebuff, B.: Thinking Strategically. Norton, New York (1991)"},{"key":"33_CR4","unstructured":"Harbison, W.: Trusting in computer systems. Technical report 437, University of Cambridge (1997)"},{"key":"33_CR5","volume-title":"Strategies and Games: Theory and Practice","author":"PK Dutta","year":"1999","unstructured":"Dutta, P.K.: Strategies and Games: Theory and Practice. MIT, Cambridge (1999)"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"33_CR7","unstructured":"Roe, M.: Cryptography and Evidence. Ph.D. thesis, University of Cambridge (1997)"},{"key":"33_CR8","volume-title":"Strategy: An Introduction to Game Theory","author":"J Watson","year":"2002","unstructured":"Watson, J.: Strategy: An Introduction to Game Theory. Norton, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T19:03:51Z","timestamp":1676660631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}