{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:43:27Z","timestamp":1771699407575,"version":"3.50.1"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Commerce Research"],"published-print":{"date-parts":[[2002,1]]},"DOI":"10.1023\/a:1013304522599","type":"journal-article","created":{"date-parts":[[2002,12,23]],"date-time":"2002-12-23T16:46:14Z","timestamp":1040661974000},"page":"151-158","source":"Crossref","is-referenced-by-count":3,"title":["Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme"],"prefix":"10.1007","volume":"2","author":[{"given":"E.C.","family":"Tan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.C.","family":"Leong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.T.","family":"Sio","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"388709_CR1","first-page":"105","volume":"9","author":"E.F. Brickell","year":"1990","unstructured":"Brickell, E.F. (1990), \u201cSome Ideal Secret Sharing Schemes.\u201d J. Combin. Math. and Combin. Comput. 9, 105\u2013113.","journal-title":"J. Combin. Math. and Combin. Comput."},{"key":"388709_CR2","volume-title":"Cryptography and Data Security","author":"D.E.R. Denning","year":"1982","unstructured":"Denning, D.E.R. (1982). Cryptography and Data Security. Harlow, UK: Addison-Wesley."},{"key":"388709_CR3","volume-title":"Cryptography and Data Security","author":"D. Elizabeth","year":"1982","unstructured":"Elizabeth, D. and R. Denning. (1982). Cryptography and Data Security. Reading, MA: Addison-Wesley."},{"key":"388709_CR4","volume-title":"Applied Numerical Analysis","author":"C.F. Gerald","year":"1994","unstructured":"Gerald, C.F. and P.O. Wheatley. (1994). Applied Numerical Analysis. Harlow, UK: Addison-Wesley."},{"key":"388709_CR5","first-page":"463","volume-title":"Proceedings of the IEEE TENCON'99","author":"P.C. Leong","year":"1999","unstructured":"Leong, P.C. and P.C. Tan. (1999). \u201cShamir's Shared Secret Scheme in GF(p\nm).\u201d In Proceedings of the IEEE TENCON'99. Cheju, Korea: IEEE Press, pp. 463\u2013466."},{"key":"388709_CR6","volume-title":"E-Commerce Business on the Internet","author":"McLaren","year":"2000","unstructured":"McLaren and McLaren. (2000). E-Commerce Business on the Internet. Singapore: Thomson Learning."},{"key":"388709_CR7","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A. (1979). \u201cHow to Share a Secret.\u201d Communications of the ACM 22, 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"388709_CR8","volume-title":"Electronic Commerce","author":"G. Schneider","year":"2000","unstructured":"Schneider, G. and J.T. Perry. (2000). Electronic Commerce. Singapore: Thomson Learning."},{"key":"388709_CR9","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B. (1996), Applied Cryptography. Harlow, UK: Addison-Wesley."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1013304522599.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1013304522599\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1013304522599.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T05:19:47Z","timestamp":1753852787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1013304522599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,1]]},"references-count":9,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2002,1]]}},"alternative-id":["388709"],"URL":"https:\/\/doi.org\/10.1023\/a:1013304522599","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,1]]}}}