{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:55Z","timestamp":1725456355576},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028163","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T01:50:22Z","timestamp":1132624222000},"page":"105-113","source":"Crossref","is-referenced-by-count":4,"title":["Binding bit patterns to real world entities"],"prefix":"10.1007","author":[{"given":"Bruce","family":"Christianson","sequence":"first","affiliation":[]},{"given":"James A.","family":"Malcolm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"9_CR1","unstructured":"Ellison, C.M., 1996, Establishing Identity without Certification Authorities, Sixth USENIX Security Symposium Proceedings 67-76"},{"key":"9_CR2","unstructured":"Ellison, C.M., Frantz, B. and Thomas, B.M., 1996, Simple Public Key Certificate, http:\/\/www.clark.net\/pub\/cme\/"},{"key":"9_CR3","unstructured":"Harbison, W.S., 1997, Trusting in Computer Systems, PhD thesis, Computer Laboratory, University of Cambridge"},{"issue":"5","key":"9_CR4","first-page":"279","volume":"34","author":"H. Lek van der","year":"1992","unstructured":"Lek, H. van der, Bakema, G.P. and Zwart, J.P.C., 1992, De Unificatie van Object-typen en Feittypen een Pracktisch en Diadactisch Vruchtbare Theorie (Unifying Object Types and Fact Types: A Practically and Didactically Productive Theory), Informatie 34(5) 279\u2013295","journal-title":"Informatie"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/37.5.422","volume":"37","author":"M.R. Low","year":"1994","unstructured":"Low, M.R. and Christianson, B., 1994, Self Authenticating Proxies, The Computer Journal 37(5) 422\u2013428","journal-title":"The Computer Journal"},{"issue":"3","key":"9_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/65.587044","volume":"11","author":"R. Needham","year":"1997","unstructured":"Needham, R., 1997, The changing Environment for Security Protocols, IEEE Network 11(3) 12\u201315","journal-title":"IEEE Network"},{"key":"9_CR7","unstructured":"Rivest, R.L. and Lampson, B., 1996, SDSI-A Simple Distributed Security Infrastructure, http:\/\/theory.Ics.mit.edu\/~rivest\/"},{"key":"9_CR8","unstructured":"Snook, J.F., 1992, Towards Secure Optimistic Distributed Open Systems, PhD thesis, University of Hertfordshire: Hatfield"},{"key":"9_CR9","unstructured":"Roe, M., 1997, Cryptography and Evidence, PhD thesis, Computer Laboratory, University of Cambridge"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:30:16Z","timestamp":1549326616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0028163","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}