{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:37:51Z","timestamp":1743039471251,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540877844"},{"type":"electronic","value":"9783540877851"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87785-1_24","type":"book-chapter","created":{"date-parts":[[2008,9,24]],"date-time":"2008-09-24T01:22:11Z","timestamp":1222219331000},"page":"268-279","source":"Crossref","is-referenced-by-count":7,"title":["VeryIDX - A Digital Identity Management System for Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Federica","family":"Paci","sequence":"first","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]},{"given":"Sam","family":"Kerr","sequence":"additional","affiliation":[]},{"given":"Aaron","family":"Lint","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Squicciarini","sequence":"additional","affiliation":[]},{"given":"Jungha","family":"Woo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Bouncy Castle Crypto APIs, http:\/\/www.bouncycastle.org\/"},{"key":"24_CR2","unstructured":"Development tools, http:\/\/www.forum.nokia.com\/main\/resources\/tools_and_sdks\/carbide\/index.html"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Woo, J., Bertino, E.: Receipt management- transaction history based trust establishment. In: Proceedings of the 2007 ACM workshop on Digital identity management, New York, NY, USA, pp. 82\u201391 (2007)","DOI":"10.1145\/1314403.1314417"},{"key":"24_CR4","unstructured":"Bhargav-Spantzel, A., Squicciarini, A.C., Xue, R., Bertino, E.: Practical Identity Theft Prevention using Aggregated Proof of Knowledge, Technical report CERIAS TR 2006-26 (2006)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/3-540-58618-0_66","volume-title":"Computer Security - ESORICS 94","author":"J. Boly","year":"1994","unstructured":"Boly, J., Bosselaers, A., Cramer, R., Michelsen, R., Mjolsnes, S., Muller, F., Pedersen, T.P., Pfitzmann, B., de Rooij, P., Schoenmakers, B., Schunter, M., Vallee, L., Waidner, M.: The ESPRIT Project CAFE - High Security Digital Payment Systems. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 217\u2013230. Springer, Heidelberg (1994)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b11817","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Shacham, H., Lynn, B.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"issue":"10","key":"24_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"issue":"3","key":"24_CR9","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1145\/355324.355325","volume":"7","author":"A. Dix","year":"2000","unstructured":"Dix, A., Rodden, T., Davies, N., Trevor, J., Friday, A., Palfreyman, K.: Exploiting space and location as a design framework for interactive mobile systems. ACM Transactions on Computer Human Interaction\u00a07(3), 285\u2013321, 200 (2000)","journal-title":"ACM Transactions on Computer Human Interaction"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Fiege, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, New York, NY, USA, pp. 210\u2013217 (1987)","DOI":"10.1145\/28395.28419"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Jendricke, U., Kreutzer, M., Zugenmaier, A.: Mobile Identity Management. In: UBICOMP 2002: Workshop on Security in Ubiquitous Computing (2002)","DOI":"10.1145\/967135.967149"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Mjolsnes, S.F., Rong, C.: Localized Credentials for Server Assisted Mobile Wallet. In: Proceedings of International Conference on Computer Networks and Mobile Computing, Los Alamitos, CA, USA (2001)","DOI":"10.1109\/ICCNMC.2001.962597"},{"key":"24_CR13","unstructured":"Near Field Communication Forum, http:\/\/www.nfc-forum.org"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Rannenberg, K.: Identity management in mobile cellular networks and related applications, Information Security Technical Report, Johann Wolfgang Goethe University Frankfurt (January 2004)","DOI":"10.1016\/S1363-4127(04)00017-2"},{"key":"24_CR15","unstructured":"SET Secure Electronic Transaction Specification Book 1: Business Description (1997)"},{"issue":"10","key":"24_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/971564.971585","volume":"1","author":"A. Wolfe","year":"2004","unstructured":"Wolfe, A.: Toolkit: Java is Jumpin\u2019. Queue\u00a01(10), 16\u201319 (2004)","journal-title":"Queue"}],"container-title":["Lecture Notes in Computer Science","Software Technologies for Embedded and Ubiquitous Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87785-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T01:12:06Z","timestamp":1557796326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87785-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540877844","9783540877851"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87785-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}