{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:14:51Z","timestamp":1725574491958},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405504"},{"type":"electronic","value":"9783540450801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45080-1_129","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:54:03Z","timestamp":1294376043000},"page":"914-918","source":"Crossref","is-referenced-by-count":0,"title":["Verifying the Payment Authorization in SET Protocol"],"prefix":"10.1007","author":[{"given":"Qingfeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shichao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"129_CR1","unstructured":"Chen, Q.F., Zhang, C.Q., Zhang, S.C.: A Logical Framework ENDL for Verifying Secure Transaction Protocols. Journal of Knowledge and Information Systems. Springer, Heidelberg. (accepted) (forthcoming)"},{"issue":"12","key":"129_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using Excryption for Authentication in Large Networks of Computers. Comm. of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Comm. of the ACM"},{"issue":"8","key":"129_CR3","first-page":"695","volume":"22","author":"S. Gritizalis","year":"1999","unstructured":"Gritizalis, S.: Security Protocols over Open networks and distributed systems: Formal methods for their Analysis, Design, and Verification. Computer Communications\u00a022(8), 695\u2013707 (1999)","journal-title":"Computer Communications"},{"key":"129_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/10722599_10","volume-title":"Computer Security - ESORICS 2000","author":"G. Bella","year":"2000","unstructured":"Bella, G., Massacci, F., Paulson, C., Tramontano, P.: Formal Verification of Cardholder Registration in SET. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 159\u2013174. Springer, Heidelberg (2000)"},{"issue":"8","key":"129_CR5","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning, D., Sacco, G.: Timestamp in Key Distribution Protocols. Communications of ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of ACM"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45080-1_129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T22:29:04Z","timestamp":1548455344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45080-1_129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405504","9783540450801"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45080-1_129","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}