{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:06:39Z","timestamp":1725573999409},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408086"},{"type":"electronic","value":"9783540452294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45229-4_12","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T00:58:04Z","timestamp":1294361884000},"page":"115-124","source":"Crossref","is-referenced-by-count":0,"title":["Toward a Security EC Transaction on Web"],"prefix":"10.1007","author":[{"given":"Whe Dar","family":"Lin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ginige, A., Murugesan, S.: Web Engineering: An Introduction. J. of IEEE MultiMedia, 14\u201318 (January 2001)","DOI":"10.1109\/93.923949"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0054114","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Young","year":"1998","unstructured":"Young, A., Yung, M.: Auto-Recoverable Auto-Certifiable Cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 17\u201331. Springer, Heidelberg (1998)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"B. Schoenmakers","year":"1999","unstructured":"Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 148\u2013164. Springer, Heidelberg (1999)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Manchala, D.W.: E-Commerce Trust Metrics and Models. J. of IEEE Internet Computing, 36\u201344 (March 2000)","DOI":"10.1109\/4236.832944"},{"issue":"6","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TKDE.2002.1047771","volume":"14","author":"J.B. Lim","year":"2002","unstructured":"Lim, J.B., Hurson, A.R.: Transaction order processing in Mobile, Heterogeneous Database Systems. IEEE Trans. On Knowledge and data Engineering\u00a014(6), 1330\u20131346 (2002)","journal-title":"IEEE Trans. On Knowledge and data Engineering"},{"key":"12_CR6","first-page":"61","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K., Rueppel, R.A.: Message recovery for signature scheme based on the discrete logarithm problem. Designs, Codes and Cryptography\u00a0(7), 61\u201381 (1996)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"12_CR7","first-page":"94","volume":"E79-A","author":"K. Usuda","year":"1996","unstructured":"Usuda, K., Mambo, M., Uyematsu, T., Okamoto, E.: Proposal of an automatic signature scheme using a Web-based platform. IEICE Trans. Fundamentals\u00a0E79-A (1), 94\u2013101 (1996)","journal-title":"IEICE Trans. Fundamentals"},{"key":"12_CR8","unstructured":"Sherwood, R., Bhattacharjee, B., Srinivasan, A.: A Protocol for Scalable Anonymous Communication. In: Proc. the IEEE Symposium on Security and Privacy, pp. 1\u201312 (2002)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-48405-1_4","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"U. Maurer","year":"1999","unstructured":"Maurer, U.: Information-Theoretic Cryptography. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 47\u201365. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45229-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:11:29Z","timestamp":1559913089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45229-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408086","9783540452294"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45229-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}