{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:51:52Z","timestamp":1742395912594,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/itcc.2004.1286418","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"12-16 Vol.1","source":"Crossref","is-referenced-by-count":10,"title":["Mitigating the untrusted terminal problem using conditional signatures"],"prefix":"10.1109","author":[{"given":"I.Z.","family":"Berta","sequence":"first","affiliation":[]},{"given":"L.","family":"Buttyan","sequence":"additional","affiliation":[]},{"given":"I.","family":"Vajda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Breaking up is hard to do: Modelling security threats for smart cards","author":"schneier","year":"1999","journal-title":"USENIX Workshop on Smart Card Technology"},{"key":"14","article-title":"Providing authentication to messages signed with a smart card in hostile environments","author":"stabell-kulo","year":"1999","journal-title":"USENIX Workshop on Smart Card Technology"},{"key":"11","article-title":"Issues in Cryptography","author":"rivest","year":"2001","journal-title":"Computers Freedom Privacy 2001 Conference"},{"journal-title":"The Solitaire Encryption Algorithm","year":"0","author":"schneier","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286418"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00020-6"},{"key":"1","article-title":"Authentication and delegation with smart-cards","author":"abadi","year":"1992","journal-title":"Proc Int Conf Theoret Aspects of Comput Softw TACS'91"},{"journal-title":"Smart Card Handbook","year":"1997","author":"rankl","key":"10"},{"key":"7","first-page":"68","article-title":"Human-computer cryptography: An attempt","author":"matsumoto","year":"1996","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"6","article-title":"Fair exchange of digital signatures using conditional signature","author":"lee","year":"2002","journal-title":"Proceedings of SCIS 2002 Symposium on Cryptography and Information Security"},{"journal-title":"The Untrusted Computer Problem and Camera-based Authentication","year":"2002","author":"clarke","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1117\/12.498617"},{"key":"9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052245","article-title":"Visual authentication and identification","volume":"1294","author":"naor","year":"1997","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","start":{"date-parts":[[2004,4,5]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2004,4,7]]}},"container-title":["International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9035\/28682\/01286418.pdf?arnumber=1286418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:36Z","timestamp":1497585396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1286418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/itcc.2004.1286418","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}