{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:42:10Z","timestamp":1730288530105,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/percom.2004.1276873","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"351-355","source":"Crossref","is-referenced-by-count":1,"title":["One-time capabilities for authorizations without trust"],"prefix":"10.1109","author":[{"given":"L.","family":"Bussard","sequence":"first","affiliation":[]},{"given":"R.","family":"Molva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"199","article-title":"Blind signatures for untraceable payments","volume":"82","author":"chaum","year":"1982","journal-title":"Proceedings of Crypto"},{"key":"2","article-title":"One-time authorization for off-line interactions","author":"bussard","year":"2003","journal-title":"Technical Report"},{"key":"1","article-title":"A technical overview of digital credentials","author":"brands","year":"2002","journal-title":"Research Report"},{"year":"1999","journal-title":"SPKI Certificate Theory","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/3-540-48285-7_28"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/586111.586114"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/0-387-34799-2_25"},{"key":"8","article-title":"Protocols for secure electronic commerce","author":"sherif","year":"2000","journal-title":"Advanced and Emerging Communications Technologies Series"}],"event":{"name":"Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the","start":{"date-parts":[[2004,3,17]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2004,3,17]]}},"container-title":["Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8996\/28556\/01276873.pdf?arnumber=1276873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:29:16Z","timestamp":1489447756000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/percom.2004.1276873","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}