{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:42Z","timestamp":1725560922077},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_4","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"42-54","source":"Crossref","is-referenced-by-count":9,"title":["Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes"],"prefix":"10.1007","author":[{"given":"Kwok-Yan","family":"Lam","sequence":"first","affiliation":[]},{"given":"Xi-Bin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Siu-Leung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jia-Guang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications\u00a015(3), 200\u2013222 (2001)","journal-title":"Int. J. Supercomputer Applications"},{"key":"4_CR2","unstructured":"Anckar, B., D\u2019Incau, D.: Value creation in mobile commerce: Findings from a consumer survey. Journal of Information Technology Theory & Application\u00a04(1) (2002)"},{"key":"4_CR3","unstructured":"Parson, K., Schaeffler, J.: U.S. wireless phone penetration climbs. Wireless Insider (October 2001)"},{"key":"4_CR4","unstructured":"Sean, G.: Networking in the palm of your hand. Network Computing\u00a013(16) (August 2002)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications\u00a011(2) (1997)","DOI":"10.1177\/109434209701100205"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Tapscott, D., Ticoll, D., Lowy, A.: The rise of business web. Ubiquity\u00a01(3) (March 2000)","DOI":"10.1145\/334425.334434"},{"key":"4_CR7","unstructured":"\u201cDengue fever prevention and control\u201d, Weekly Epidemiological Record 77(6), 41\u201348 (August 2002)"},{"key":"4_CR8","unstructured":"\u201cOverview of the Grid Security Infrastructure\u201d, at http:\/\/www-fp.globus.org\/security\/overview.html"},{"issue":"8","key":"4_CR9","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/S0140-3664(99)00031-6","volume":"22","author":"J.Y. Zhou","year":"1999","unstructured":"Zhou, J.Y., Lam, K.Y.: Securing digital signatures for non-repudiation. Journal of Computer Communications\u00a022(8), 710\u2013716 (1999)","journal-title":"Journal of Computer Communications"},{"key":"4_CR10","unstructured":"Internet Engineering Task Force. \u201cTransport Layer Security (TLS)\u201d, http:\/\/www.ietf.org\/html.charters\/tls-charter.html"},{"key":"4_CR11","unstructured":"The Open Mobile Alliance Ltd, \u201cWireless Application Protocol\u201d, http:\/\/www.wapforum.org"},{"key":"4_CR12","unstructured":"ISO\/IEC DIS 9798-3. \u201cInformation technology, security techniques, entity authentication, Part 3: mechanisms using digital signature techniques (Second Edition)\u201d, ISO\/IEC (1998)"},{"key":"4_CR13","unstructured":"Lam, K.Y.: Building an Authentication Service for Distributed Systems. Journal of Computer Security\u00a02(1), IOS (Amsterdam) (1993)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 92","author":"K.Y. Lam","year":"1992","unstructured":"Lam, K.Y., Gollmann, D.: Freshness Assurance of Authentication Protocols. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, Springer, Heidelberg (1992)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:41:17Z","timestamp":1559331677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}