{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:05:07Z","timestamp":1725703507060},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673446"},{"type":"electronic","value":"9783642583278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/978-3-642-58327-8_31","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T01:46:35Z","timestamp":1349487995000},"page":"649-690","source":"Crossref","is-referenced-by-count":1,"title":["Electronic Commerce: Privacy, Security, and Control"],"prefix":"10.1007","author":[{"given":"Daniel G.","family":"Conway","sequence":"first","affiliation":[]},{"given":"Gary J.","family":"Koehler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Backman D., \u201cKerberos: A Piece of the Net Security Puzzle\u201d, Network Computing Online, July, (1997)"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S Bellovin","year":"1989","unstructured":"Bellovin S., \u201cSecurity Problems in the TCP\/IP Protocol Suite\u201d, Computer Communication Review, Vol. 19, No. 2, April, (1989), 32\u201348","journal-title":"Computer Communication Review"},{"key":"31_CR3","unstructured":"Borland J., \u201cEncryption Lawsuit back on \u2018Fast Track\u2019,\u201d CMPnet, March 30, (1998)"},{"key":"31_CR4","unstructured":"Borland J., \u201cWill FBI Lab End Crypto Wars?\u201d CMPnet, April 8, (1998)"},{"key":"31_CR5","unstructured":"Burke B., \u201cThe Hacker Hall of Fame: A Rogues Gallery of High-tech Pirates,\u201d BusinessTo-day.com, February 25, (1998)"},{"key":"31_CR6","volume-title":"Building Internet Firewalls","author":"D Chapman","year":"1995","unstructured":"Chapman D., & E. Zwicky, Building Internet Firewalls. O\u2019Reilly & Associates, Inc., Cambridge, MA, 1995"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Cheng P., J. Garay, A. Herzberg, & H. Krawczyk, \u201cA security architecture for the Internet Protocol\u201d, IBM Systems Journal, (1998)","DOI":"10.1147\/sj.371.0042"},{"key":"31_CR8","unstructured":"Clausing J., \u201cAdministration to Allow Limited Data-Scrambling Exports,, \u201d New York Times, July 8, 1998"},{"key":"31_CR9","unstructured":"CNN Interactive, \u201cComputer Hacker Plants Porno on Air Force Web Page,\u201d CNN Interactive, Dec. 30, (1996)"},{"key":"31_CR10","volume-title":"Internetworking with TCP\/IP","author":"D Comer","year":"1995","unstructured":"Comer D., Internetworking with TCP\/IP, Volume I, Prentice Hall, Englewood Cliffs, New Jersey, 1995"},{"issue":"6","key":"31_CR11","first-page":"109","volume":"IT-22","author":"W Diffie","year":"1976","unstructured":"Diffie W., & M. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Transactions on Information Theory, V. IT-22, n. 6, Nov (1976), 109\u2013112","journal-title":"IEEE Transactions on Information Theory"},{"key":"31_CR12","unstructured":"Dornin R., \u201cReno Announces New Center to Combat Cyber-crime,\u201d CNN Interactive, February 28, (1998)"},{"key":"31_CR13","unstructured":"Drash W. & J. Morris, \u201cHackers Vandalize CIA Home Page,\u201d CNN Interactive, Sept. 19, (1996)"},{"key":"31_CR14","volume-title":"At Large: The Strange Case of the World\u2019s Biggest Internet Invasion","author":"D Freedman","year":"1997","unstructured":"Freedman D. & C. Mann, At Large: The Strange Case of the World\u2019s Biggest Internet Invasion, Simon and Schuster, New York, 1997"},{"key":"31_CR15","volume-title":"PGP \u2014 Pretty Good Privacy","author":"S Garfinkel","year":"1995","unstructured":"Garfinkel S., PGP \u2014 Pretty Good Privacy, O\u2018Reilly & Associates, Inc., Cambridge, MA, 1995"},{"key":"31_CR16","unstructured":"George D., Study: \u201cU.S. Vulnerable to Cyberterrorism,\u201d CNN Interactive, October 21, (1997)"},{"key":"31_CR17","volume-title":"Cyberpunk: Outlaws and Hackers on the Computer Frontier","author":"K Hafner","year":"1991","unstructured":"Hafner K. & J. Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, Simon and Schuster, New York, 1991"},{"key":"31_CR18","unstructured":"Hall E., \u201cInternet Firewall Essentials\u201d, Network Computing Online, Nov, (1997)"},{"key":"31_CR19","unstructured":"Higgins K., \u201cS\/MIME And OpenPGP Vie For Security Title\u201d, Network Computing Online, Sept, (1997)"},{"key":"31_CR20","volume-title":"Java Network Programming","author":"M Hughes","year":"1997","unstructured":"Hughes M., C. Hughes, M. Shoffner & M. Winslow, Java Network Programming, Manning Publications Co., Greenwich, CT 1997"},{"key":"31_CR21","volume-title":"Hacker Proof: The Ultimate Guide to Network Security","author":"L Klander","year":"1997","unstructured":"Klander L., Hacker Proof: The Ultimate Guide to Network Security, Jamsa Press, Las Vegas, 1997"},{"key":"31_CR22","unstructured":"Klein D., \u201cFoiling the Cracker: A Survey of, and Improvements to, Password Security\u201d, Software Engineering Institute, Carnegie Mellon University, (1991). Document reproduced at \n                    URL=http:\/\/rootshell.connectnet.com\n                    \n                  \/docs\/passwords_klein.ps.gz"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Lai X., & J Massey, \u201cA Proposal for a New Block Encryption Standard\u201d, Advances in Cryptology \u2014 EUROCRYPT \u201890 Proceedings, Springer-Verlag, (1991), 389\u2013404","DOI":"10.1007\/3-540-46877-3_35"},{"key":"31_CR24","volume-title":"The Fugitive Game: Online With Kevin Mitnick","author":"J Littman","year":"1997","unstructured":"Littman J., The Fugitive Game: Online With Kevin Mitnick, Little Brown & Co., Boston, 1997"},{"key":"31_CR25","unstructured":"Martinez M., \u201cPentagon Hacker Nabbed,\u201d ABCNEWS.com, March 19, (1998)"},{"key":"31_CR26","unstructured":"Martinez M., \u201cU.S. Wants Encryption Keys,\u201d ABCNEWS.com, March 2, (1998)"},{"issue":"4","key":"31_CR27","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R Merkle","year":"1978","unstructured":"Merkle R., \u201cSecure Communication Over Insecure Channels,\u201d Communications of the ACM, v. 21, n. 4, (1978), 294\u2013299","journal-title":"Communications of the ACM"},{"key":"31_CR28","unstructured":"Moskowitz R., \u201cIPSec For Communities Of Interest\u201d, Network Computing Online, Sep, (1997)"},{"key":"31_CR29","unstructured":"Moskowitz R., \u201cWhat is a Virtual Private Network\u201d, Network Computing Online, Sep, (1997)"},{"key":"31_CR30","unstructured":"National Bureau of Standards and Technology, NGS FIPS PUB 46, \u201cData Encryption Standard\u201d, National Bureau of Standards, US Department of Commerce, Jan (1977)"},{"key":"31_CR31","unstructured":"National Institute of Standards and Technology, NIST FIPS PUB 186, \u201cDigital Signature Standard,\u201d U.S. Department of Commerce, May (1994)"},{"issue":"9","key":"31_CR32","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B Neuman","year":"1994","unstructured":"Neuman B., & T Ts\u2019o, \u201cKerberos: An Authentication Service for Computer Networks\u201d, IEEE Communications Magazine, Vol 32, Number 9, pp. 33\u201338, Sep (1994)","journal-title":"IEEE Communications Magazine"},{"key":"31_CR33","unstructured":"Ranum M., \u201cAn Internet Firewall\u201d, Proceedings of World Conference on Systems Management and Security, (1992)"},{"key":"31_CR34","unstructured":"Rivest R., \u201cChaffing and Winnowing: Confidentiality without Encryption,\u201d March 18, 1998, \n                    URL=http:\/\/theory.lcs.mit.edu\n                    \n                  \/~rivest\/chaffing.txt"},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Rivest R., \u201cThe MD4 Message Digest Algorithm,\u201d Advances in Cryptology\u2013CRYPTO \u201890 Proceedings, Springer-Verlag, (1991), 303\u2013311","DOI":"10.1007\/3-540-38424-3_22"},{"issue":"2","key":"31_CR36","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R., A. Shamir, & L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Communications of the ACM, v. 21, n. 2, Feb (1978), 120\u2013126","journal-title":"Communications of the ACM"},{"key":"31_CR37","volume-title":"Applied Cryptography: Protocols Algorithms, and Source Code in C, Second Edition","author":"B Schneier","year":"1996","unstructured":"Schneier B., Applied Cryptography: Protocols Algorithms, and Source Code in C, Second Edition, John Wiley & Sons, New York, 1996"},{"key":"31_CR38","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A., \u201cHow to Share a Secret.\u201d, Communications of the ACM 22 (1979), 612\u2013613","journal-title":"Communications of the ACM"},{"key":"31_CR39","volume-title":"America\u2019s Most Wanted Computer Outlaw-By the Man Who Did It","author":"T Shimomura","year":"1996","unstructured":"Shimomura T. & J Markoff, Takedown: The Pursuit and Capture of Kevin Mitnick, America\u2019s Most Wanted Computer Outlaw-By the Man Who Did It, Hyperion, New York, 1996"},{"key":"31_CR40","unstructured":"Smith G., \u201cHacking Away at the Pentagon,\u201d ABCNEWS.com, March 3, (1998)"},{"key":"31_CR41","unstructured":"Smith J., \u201cThe Design of Lucifer, A Cryptographic Device for Data Communications,\u201d IBM Research Report RC3326, (1971)"},{"key":"31_CR42","volume-title":"Tcp\/Ip Illustrated: Tcp for Transactions, Http, Nntp, and the Unix Domain Protocols","author":"W Stevens","year":"1996","unstructured":"Stevens W. & G. Wright Tcp\/Ip Illustrated: Tcp for Transactions, Http, Nntp, and the Unix Domain Protocols (Vol 3), Addison-Wesley, Reading, MA, 1996"},{"key":"31_CR43","unstructured":"Stinson D., Cryptography Theory and Practice. CRC Press Inc., 1995"},{"key":"31_CR44","volume-title":"The Cuckoo\u2019s Egg","author":"C Stoll","year":"1989","unstructured":"Stoll C, The Cuckoo\u2019s Egg, Doubleday, New York, 1989"},{"key":"31_CR45","unstructured":"Venners B., \u201cJava\u2019s Security Architecture,\u201d JavaWorld, August, (1997)"},{"key":"31_CR46","unstructured":"Venners B., \u201cSecurity and the Class Loader Architecture,\u201d JavaWorld, September, (1997)"},{"key":"31_CR47","unstructured":"Venners B., \u201cSecurity and the Class Verifier,\u201d JavaWorld, October, (1997)"},{"key":"31_CR48","unstructured":"Whinston A., D Stahl, & S Choi, The Economics of Electronic Commerce, Macmillan Technical Publishing, 1997"},{"key":"31_CR49","unstructured":"Willis D., \u201cVillians in the Vault\u201d, Network Computing Online, Oct, (1997)"},{"key":"31_CR50","unstructured":"Yerxa G., \u201cThwarting Malicious Java Attacks\u201d, Network Computing Online, Sept 4, (1997)"}],"container-title":["Handbook on Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-58327-8_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T11:04:04Z","timestamp":1620299044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-58327-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673446","9783642583278"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-58327-8_31","relation":{},"subject":[],"published":{"date-parts":[[2000]]}}}