{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:02Z","timestamp":1754157662527,"version":"3.41.2"},"reference-count":1,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[1997,8,1]],"date-time":"1997-08-01T00:00:00Z","timestamp":870393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997,8,1]]},"abstract":"<jats:p>Presents the major approaches for achieving commercial security on the Internet, public key and key escrow. Discusses the implications of (US) legislation putting limitations on the type or strength of key it is best to employ for a given business. Presents the typical modes of delivering authentication and other services.<\/jats:p>","DOI":"10.1108\/09685229710175738","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"87-89","source":"Crossref","is-referenced-by-count":1,"title":["Commercialization of cryptography"],"prefix":"10.1108","volume":"5","author":[{"given":"Carrie","family":"Liddy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022021820042432100_b1","doi-asserted-by":"crossref","unstructured":"1.See\u201cCommercial security on the Internet\u201d, Information Management & Computer Security, Vol. 4 No. 1, 1996.","DOI":"10.1108\/09685229610114222"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229710175738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229710175738\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229710175738\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:44Z","timestamp":1753402184000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/5\/3\/87-89\/391120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,8,1]]},"references-count":1,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,8,1]]}},"alternative-id":["10.1108\/09685229710175738"],"URL":"https:\/\/doi.org\/10.1108\/09685229710175738","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1997,8,1]]}}}