{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:42Z","timestamp":1725922182123},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_17","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T17:37:18Z","timestamp":1511890638000},"page":"144-156","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reconciling Multiple Objectives \u2013 Politics or\u00a0Markets?"],"prefix":"10.1007","author":[{"given":"Ross","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Baqer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"17_CR1","unstructured":"Directive 2009\/28\/EC of the European Parliament and of the Council of 23 April 2009 on the promotion of the use of energy from renewable sources and amending and subsequently repealing Directives 2001\/77\/EC and 2003\/30\/EC. European Parliament (2009)"},{"key":"17_CR2","unstructured":"The IBM punched card. IBM Inc (2017)"},{"key":"17_CR3","unstructured":"Verisign. Wikipedia (2017)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why cryptosystems fail. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 215\u2013227. ACM (1993)","DOI":"10.1145\/168588.168615"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Anderson, R.: The initial costs and maintenance costs of protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) International Workshop on Security Protocols. LNCS, vol. 4631, pp. 336\u2013343. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77156-2_42","DOI":"10.1007\/978-3-540-77156-2_42"},{"key":"17_CR6","unstructured":"Anderson, R.: Security Engineering. Wiley, Hoboken (2008)"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Anderson, R.: Protocol governance: the elite, or the mob? In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) International Workshop on Security Protocols. LNCS, vol. 7622, p. 145. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35694-0_16","DOI":"10.1007\/978-3-642-35694-0_16"},{"key":"17_CR8","unstructured":"Anderson, R.: Making security sustainable. Commun. ACM (forthcoming)"},{"issue":"2","key":"17_CR9","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proc. IEEE 94(2), 357\u2013369 (2006)","journal-title":"Proc. IEEE"},{"issue":"10","key":"17_CR10","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/2660574","volume":"57","author":"A Arnbak","year":"2014","unstructured":"Arnbak, A., Asghari, H., Van Eeten, M., Van Eijk, N.: Security collapse in the HTTPs market. Commun. ACM 57(10), 47\u201355 (2014)","journal-title":"Commun. ACM"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Baqer, K., Anderson, R.: Do you believe in Tinker Bell? The social externalities of trust. In: Christianson, B., \u0160venda, P., Maty\u00e1\u0161, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) International Workshop on Security Protocols. LNCS, vol. 9379, pp. 224\u2013236. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-26096-9_23","DOI":"10.1007\/978-3-319-26096-9_23"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Baqer, K., Bezuidenhoudt, J., Anderson, R., Kuhn, M.: SMAPs: short message authentication protocols. In: Anderson, J., Maty\u00e1\u0161, V., Christianson, B., Stajano, F. (eds.) Security Protocols 2016. LNCS, vol. 10368, pp. 119\u2013132. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-62033-6_15","DOI":"10.1007\/978-3-319-62033-6_15"},{"key":"17_CR13","unstructured":"Blackstone, W.: Commentaries on the Laws of England, vol. 2. Collins & Hannay, New York (1830)"},{"issue":"10","key":"17_CR14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/2.955101","volume":"34","author":"M Bond","year":"2001","unstructured":"Bond, M., Anderson, R.: API-level attacks on embedded systems. Computer 34(10), 67\u201375 (2001)","journal-title":"Computer"},{"key":"17_CR15","unstructured":"Grossman, W.: Don\u2019t die interview, 21 October 2016. \nwww.nodontdie.com"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"K\u00fcnneke, R.W., Groenewegen, J., Auger, J.F.: The Governance of Network Industries: Institutions, Technology and Policy in Reregulated Infrastructures. Edward Elgar Publishing, Cheltenham (2009)","DOI":"10.4337\/9781849802178"},{"issue":"6","key":"17_CR17","first-page":"40","volume":"10","author":"SJ Murdoch","year":"2012","unstructured":"Murdoch, S.J., Bond, M., Anderson, R.: How certification systems fail: lessons from the ware report. IEEE Secur. Privacy 10(6), 40\u201344 (2012)","journal-title":"IEEE Secur. Privacy"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 433\u2013446. IEEE (2010)","DOI":"10.1109\/SP.2010.33"},{"issue":"3","key":"17_CR19","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"LC Paulson","year":"1999","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(3), 332\u2013351 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"17_CR20","unstructured":"Pinker, S.: The Better Angels of Our Nature: The Decline of Violence in History and its Causes. Penguin, London (2011)"},{"issue":"1","key":"17_CR21","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1353\/jod.1995.0002","volume":"6","author":"RD Putnam","year":"1995","unstructured":"Putnam, R.D.: Bowling alone: America\u2019s declining social capital. J. Democracy 6(1), 65\u201378 (1995)","journal-title":"J. Democracy"},{"key":"17_CR22","unstructured":"Rescorla, E.: Stone knives and bear skins: why does the internet still run on pre-historic cryptography. INDOCRYPT (Invited talk) (2006)"},{"key":"17_CR23","unstructured":"Shapiro, C., Varian, H.R.: Information Rules: A Strategic Guide to the Network Economy. Harvard Business Press, Brighton (1998)"},{"key":"17_CR24","unstructured":"Youn, P., Adida, B., Bond, M., Clulow, J., Herzog, J., Lin, A., Rivest, R.L., Anderson, R.: Robbing the bank with a theorem prover. Technical report, University of Cambridge, Computer Laboratory (2005)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T17:40:42Z","timestamp":1511890842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}