{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T04:23:47Z","timestamp":1649132627366},"reference-count":23,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1999,11,1]],"date-time":"1999-11-01T00:00:00Z","timestamp":941414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1999,11]]},"DOI":"10.1016\/s0164-1212(99)00055-2","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T02:09:52Z","timestamp":1049508592000},"page":"165-175","source":"Crossref","is-referenced-by-count":2,"title":["Achieving non-repudiation of Web based transactions"],"prefix":"10.1016","volume":"48","author":[{"given":"Malleswar","family":"Kalla","sequence":"first","affiliation":[]},{"given":"Johnny S.K","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Armin R","family":"Mikler","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Elbert","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(99)00055-2_BIB1","unstructured":"Benolah, et al., 1998. Private Communications Technology Protocol. http:\/\/sectest.microsoft.com\/pct\/pct1.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB2","unstructured":"Braverman, A., 1995. NCSA Mosaic Common Client Interface. http:\/\/www.ncsa.uiuc.edu\/SDG\/Software\/XMosaic\/CCI\/cci-spec.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB3","unstructured":"Denning, D., 1982. Cryptography and Data Security. Addison\u2013Wesley, Reading, MA, 1982"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB4","doi-asserted-by":"crossref","unstructured":"Diffie, H., 1977. Exhaustive Cryptanalysis of the NBS Data Encryption Standard Computer, pp. 74\u201384","DOI":"10.1109\/C-M.1977.217750"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB5","unstructured":"Graham, I., 1996. HTML Sourcebook, Wiley Computer Publishing, 1996"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB6","unstructured":"Hickman, K., Elgamal, T., 1996. Secure Sockets Layer Specifications, HYPERLINK http:\/\/home.netscape.com\/newsref\/ssl\/3-SPEC.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB7","unstructured":"International Telegraph and Telephone Consultative Committee (CCITT), 1988. Recommendation X.509: The Directory Authentication Framework"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB8","unstructured":"Kaufman, C., Perlman, R., Speciner, M., 1995. Network Security Prentice Hall PTR. Englewood Cliffs, New Jersey"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB9","unstructured":"Menezes, A.J., Oorschotvan, P.C., Vanstone, S.A., 1997. Handbook of Applied Cryptography. CRC-Press LLC, New York"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB10","doi-asserted-by":"crossref","unstructured":"Needham, S., 1978. Schroeder Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM","DOI":"10.1145\/359657.359659"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB11","unstructured":"Netscape Commerce Server, 1996. http:\/\/home.mcom.com\/comprod\/netscape_commerce.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB12","unstructured":"Netscape Plug-in Resources, 1995. http:\/\/home.dk.netscape.com\/comprod\/products\/navigator\/version_2.0\/plugins\/resources.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB13","doi-asserted-by":"crossref","unstructured":"Raju, R., 1990. A Key Management Algorithm for Secure Communication in Open Systems Interconnection Architecture Computer and Security 9, 77\u201384","DOI":"10.1016\/0167-4048(90)90160-U"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB14","unstructured":"Rescorala, E., Schiffman, A., 1996. Secure HTTP http:\/\/www.eit.com\/creations\/s-http"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB15","unstructured":"RFC, 1945. Hypertext Transfer Protocol http:\/\/www.ics.uci.edu\/pub\/ietf\/http\/rfc1945"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB16","doi-asserted-by":"crossref","unstructured":"Rivest, Shamir, Adleman, 1978. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM","DOI":"10.1145\/359340.359342"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB17","doi-asserted-by":"crossref","unstructured":"Sirbu, M., Tygar, J.D., 1995. NetBill: An internet Commerce System Optimized for Network Delivered Services, IEEE Personal Communications, 6\u201311","DOI":"10.1109\/CMPCON.1995.512358"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB18","unstructured":"Terisa Systems Secure Web Documents, 1994. http:\/\/www.terisa.com\/products\/swd\/"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB19","doi-asserted-by":"crossref","unstructured":"Voydock, 1983. Kent Security Mechanisms in High-Level Network Protocols Computing Surveys, vol. 15, No. 2","DOI":"10.1145\/356909.356913"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB20","unstructured":"Weeks, J., Cain, A., Sanderson, B., 1997. CCI Based Web Security. http:\/\/www.w3.org\/pub\/WWW\/Journal\/1\/g.245\/paper\/245.html"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB21","doi-asserted-by":"crossref","unstructured":"Wright, M., 1990. Communication Security in a Distributed Network. ACM Security Audit privacy, vol. 7, No. 4, Winter","DOI":"10.1145\/382089.382091"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB22","unstructured":"Young, E., SSLeay, SSLapps FAQ, 1996. http:\/\/www.psy.uq.oz.au\/~ftp\/Crypto\/"},{"key":"10.1016\/S0164-1212(99)00055-2_BIB23","unstructured":"Zimmerman, P., 1995. The Official PGP User's Guide. MIT Press, Cambridge, MA"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121299000552?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121299000552?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T13:15:29Z","timestamp":1578489329000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121299000552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,11]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1999,11]]}},"alternative-id":["S0164121299000552"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(99)00055-2","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1999,11]]}}}