{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T05:32:35Z","timestamp":1736314355795,"version":"3.32.0"},"publisher-location":"Berlin\/Heidelberg","reference-count":21,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540530002"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0030382","type":"book-chapter","created":{"date-parts":[[2006,1,25]],"date-time":"2006-01-25T15:24:26Z","timestamp":1138202666000},"page":"433-450","source":"Crossref","is-referenced-by-count":1,"title":["The three faces of information security"],"prefix":"10.1007","author":[{"given":"John M.","family":"Carroll","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Agnew, G.B., Secrecy and Privacy in a Global Area Network Environment, Proc. Eurocrypt'84, pp. 349\u2013363.","key":"38_CR1","DOI":"10.1007\/3-540-39757-4_24"},{"unstructured":"Anderson, D.P., et al., A Protocol for Secure Communication and its Performance, Proc. 7th Int. Conf. on Distributed Computing, 1988, pp. 473\u2013480.","key":"38_CR2"},{"doi-asserted-by":"crossref","unstructured":"Blum, M. and S. Micali, How to Generate Cryptographically Secure Sequences of Pseudo Random Bits, Proc. 23rd Sym. on Foundations of Computer Science, 1982, p. 112\u2013117.","key":"38_CR3","DOI":"10.1109\/SFCS.1982.72"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D. and T.H. Guenta, A Secure and Privacy Protecting Protocol for Transmitting Personal Information Between Organisations,Proc. Eurocrypt'85, pp. 118\u2013167.","key":"38_CR4","DOI":"10.1007\/3-540-47721-7_10"},{"doi-asserted-by":"crossref","unstructured":"Davida, G.I., et al., Security and Privacy, Proc. Compsac`78,pp. 194\u2013203.","key":"38_CR5","DOI":"10.1109\/CMPSAC.1978.810378"},{"unstructured":"Davies. D.W. and J.K. Hirst, Encipherment and Signature in Teletex, Proc. 6th ICCC, 1982.","key":"38_CR6"},{"unstructured":"Davio, M., J.M. Geothals and J.J. Quisquater, Authentication Procedures, Workshop on Cryptography, Bad Feurstein, DBR, May 29\u2013April 2, 1982.","key":"38_CR7"},{"doi-asserted-by":"crossref","unstructured":"Even, S., et al., On the Security of Ping-Pong Protocols when Implemented using the RSA, Proc. Eurocrypt'84, pp. 58\u201392.","key":"38_CR8","DOI":"10.1007\/3-540-39799-X_7"},{"unstructured":"Ramesh, K., A Security Imbedded Authentication Protocol, Proc. IEEE Infocom'88, pp. 105\u2013109.","key":"38_CR9"},{"unstructured":"Kent, S.T., et al., A Personal Authentication System for Access Control to the Defense Data Network, Proc. Eascon'82, pp. 89\u201393.","key":"38_CR10"},{"unstructured":"Letham, L., et al., Software Security is Provided by an EPROM that Performs an Authentication Handshake, 4th Int. Conf. on Computers and Communications, 1985, pp. 122\u2013126.","key":"38_CR11"},{"unstructured":"Mason, A., A Pay-Per-View Conditional Access System for DBS by Means of Secure Over-Air Credit Transmissions, Proc. Int. Conf. on Secure Communications Systems, 1984, pp. 66\u201370.","key":"38_CR12"},{"key":"38_CR13","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0169-7552(88)90058-X","volume":"15","author":"S. Muftic","year":"1988","unstructured":"Muftic, S., Secure Mechanisms for Computer Networks: Results of the CEC COST-11 Tex Project, Computer Networks and ISDN Systems, 15, 1988, pp. 67\u201372.","journal-title":"Computer Networks and ISDN Systems"},{"unstructured":"Perugia, O. et al., On Encryption and Authentication Procedures for Tele-Surveillance Systems, Ottawa, 1981.","key":"38_CR14"},{"unstructured":"Price, W., Encryption in Computer Networks and Message Systems, Int. Sym. on Computer Systems, Ottawa, 1981.","key":"38_CR15"},{"doi-asserted-by":"crossref","unstructured":"Purdy, G.B., G.J. Simmonds and James A. Studier, A Software Protection Scheme, Proc. Sym. on Security and Privacy, 1982, pp. 99\u2013103.","key":"38_CR16","DOI":"10.1109\/SP.1982.10012"},{"unstructured":"Rivest, R.L., A. Shamir and L.M. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, AAAS Annual Meeting, 1980.","key":"38_CR17"},{"doi-asserted-by":"crossref","unstructured":"Shaum\u00fcller-Bichl, I. and E. Piller, A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Technique, Proc. Eurocrypt'84, pp. 446\u2013454.","key":"38_CR18","DOI":"10.1007\/3-540-39757-4_32"},{"unstructured":"Simmonds, G.J., Message Authentication Without Privacy, AAAS Annual Meeting, 1980.","key":"38_CR19"},{"unstructured":"Simmonds, G.J., The Practice of Authentication, Proc. Eurocrypt'86, pp. 81\u201384.","key":"38_CR20"},{"doi-asserted-by":"crossref","unstructured":"Vazinani, U. and V.V Vazinani, Efficient and Secure Pseudo-Random Number Generation, Proc. Crypto'84, pp. 193\u2013201.","key":"38_CR21","DOI":"10.1007\/3-540-39568-7_17"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0030382.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T11:55:36Z","timestamp":1736250936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0030382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540530002"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0030382","relation":{},"subject":[]}}