{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:51:27Z","timestamp":1725569487957},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405313"},{"type":"electronic","value":"9783540450702"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45070-2_11","type":"book-chapter","created":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T16:23:52Z","timestamp":1289233432000},"page":"225-247","source":"Crossref","is-referenced-by-count":4,"title":["Open APIs for Embedded Security"],"prefix":"10.1007","author":[{"given":"Carl A.","family":"Gunter","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Grosu, R., Wang, B.-Y.: Automated refinement checking for asynchronous processes. In: 3rd International Conference on Formal Methods in Computer-Aided Design (2000)","DOI":"10.1007\/3-540-40922-X_5"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Alur, R., Wang, B.-Y.: Verifying network protocol implementations by symbolic refinement checking. In: 13th International Conference on Computer- Aided Verification (2001)","DOI":"10.1007\/3-540-44585-4_15"},{"key":"11_CR3","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"G. Bella","year":"2002","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: The verification of an industrial payment protocol. In: Atluri, V. (ed.) Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, ACM Press, New York (2002)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Gunter, C.A.: Requirements for a network event recognition language. Electronic Notes in Theoretical Computer Science, vol.\u00a070(4) (December 2002)","DOI":"10.1016\/S1571-0661(04)80574-7"},{"key":"11_CR5","unstructured":"Detlefs, D.L., Rustan, K., Leino, M., Nelson, G., Sax, J.B.: Extended static checking. Research Report 159, Compaq Systems Research Center (1998)"},{"key":"11_CR6","volume-title":"Paying with Plastic","author":"D. Evans","year":"1999","unstructured":"Evans, D., Schmalensee, R.I.: Paying with Plastic. MIT Press, Cambridge (1999)"},{"key":"11_CR7","first-page":"298","volume-title":"Proceedings of CASES 2003 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems","author":"A. Goodloe","year":"2002","unstructured":"Goodloe, A., McDougall, M., Alur, R., Gunter, C.A.: Predictable programs in barcodes. In: Jerraya, A., Wolf, W. (eds.) Proceedings of CASES 2003 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, Grenoble, France, pp. 298\u2013303. ACM Press, New York (2002)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/3-540-48166-4_29","volume-title":"Software Engineering - ESEC\/FSE \u201999","author":"G. Grimaud","year":"1999","unstructured":"Grimaud, G., Lanet, J.-L., Vandewalle, J.-J.: FACADE: A typed intermediate language dedicated to smart cards. In: Nierstrasz, O., Lemoine, M. (eds.) ESEC 1999 and ESEC-FSE 1999. LNCS, vol.\u00a01687, pp. 476\u2013493. Springer, Heidelberg (1999)"},{"key":"#cr-split#-11_CR9.1","doi-asserted-by":"crossref","unstructured":"Gunter, C.A.: Micro mobile programs. In: Baeza-Yates, R., Montanari, U., Santoro, N. (eds.) Foundations of Information Technology in the Era of Network and Mobile Computing, Montreal, Canada, August 2002, pp. 356\u2013369 (2002);","DOI":"10.1007\/978-0-387-35608-2_30"},{"key":"#cr-split#-11_CR9.2","unstructured":"IFIP 17th World Computer Congress \u2014 TC1 Stream \/ International Conference on Theoretical Computer Science (TCS 2002). Kluwer, Dordrecht (2002)"},{"key":"11_CR10","unstructured":"Nelson, G., Rustan, K., Leino, M., Saxe, J.B.: ESC\/java user\u2019s manual. Technical Note 2000-002, Compaq Systems Research Center (October 2000)"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification for Java smart card. Software Practice & Experience\u00a032, 319\u2013340 (2002)","journal-title":"Software Practice & Experience"},{"key":"11_CR12","unstructured":"Lyubich, M.: Eine SET Kundemb\u00f6rse mit der Java Card Unterst\u00fctzung. In: GI Informatiktage 2000. Konradin-Verlag (November 2000)"},{"key":"11_CR13","unstructured":"Lyubich, M.: Die architekturen von SET mit der Java Card. In: Bode, A., Karl, W. (eds.) ITG Fachbericht, APC 2001 Arbeitsplatzcomputer (2001)"},{"key":"11_CR14","unstructured":"Lyubich, M., Cap, C.: Eine implementierung von SET f\u00fcr Java. In: Tagesband Netzinfrustruckhur und Anwendugen f\u00fcr Informationsgesellschaft, pp. 208\u2013214. Dr. Wilke Verlag (1998)"},{"key":"11_CR15","unstructured":"Lyubich, M.: Architectural Concepts for Java Card Running a Payment Protocol and Their Application in a SET Wallet. PhD thesis, University of Rostock (2003)"},{"key":"11_CR16","unstructured":"Mastercard and Visa. SET Secure Electronic Transaction Specification: Business Description (May 1997)"},{"key":"11_CR17","unstructured":"Mastercard and Visa. SET Secure Electronic Transaction Specification: External Interface Guide (May 1997)"},{"key":"11_CR18","unstructured":"Mastercard and Visa. SET Secure Electronic Transaction Specification: Formal Protocol Definition (May 1997)"},{"key":"11_CR19","unstructured":"Mastercard and Visa. SET Secure Electronic Transaction Specification: Programmer\u2019s Guide (May 1997)"},{"key":"11_CR20","unstructured":"Rose, E., Rose, K.H.: Lightweight bytecode verification. In: Workshop \u201cFormal Underpinnings of the Java Paradigm\u201d, OOPSLA 1998 (1998)"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security\u00a03, 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"11_CR22","volume-title":"Secrets and Lies","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies. John Wiley & Sons, Chichester (2000)"},{"key":"11_CR23","unstructured":"Sun Microsystems. Java 2 Platform Icro Edition (J2ME) Technology for Creating Mobile Devices (May 2000). White paper, \n                    \n                      http:\/\/java.sun.com\/products\/cldc\/wp\/KVMwp.pdf"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-45319-9_21","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J. Berg van den","year":"2001","unstructured":"van den Berg, J., Jacobs, B.: The LOOP compiler for Java and JML. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol.\u00a02031, pp. 299\u2013312. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2003 \u2013 Object-Oriented Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45070-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T16:16:16Z","timestamp":1548432976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45070-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405313","9783540450702"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45070-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}