{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:04:54Z","timestamp":1750316694929,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/wifs.2009.5386474","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T21:14:24Z","timestamp":1264194864000},"page":"106-110","source":"Crossref","is-referenced-by-count":29,"title":["Efficient implementation of anonymous credentials on Java Card smart cards"],"prefix":"10.1109","author":[{"given":"Michael","family":"Sterckx","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"201","article-title":"Bipartite modular multiplication","volume":"3659","author":"kaihara","year":"2005","journal-title":"Proc Workshop Cryptographic Hardware and Embedded Systems (CHES '05)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_4"},{"journal-title":"Sun Microsystems","article-title":"Application programming interface, Java Card platform","year":"2006","key":"ref12"},{"journal-title":"Sun Microsystems","article-title":"Java Card application programming interface (API), version 3.0.1","year":"2009","key":"ref13"},{"journal-title":"JFern Version 1 2 1","article-title":"Java Card application programming interface","year":"2000","key":"ref4"},{"key":"ref3","first-page":"2008","article-title":"Implementation of an anonymous credential protocol","author":"sucasas","year":"0"},{"journal-title":"Trusted Computing Group","article-title":"Trusted Platform Module Specification","year":"0","key":"ref6"},{"journal-title":"Version 2 2","article-title":"Java Card platform application programming interface","year":"2003","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref7","article-title":"Algorithms for multi-exponentiation","author":"m\u00f6ller","year":"2001","journal-title":"Tech Rep TU Darmstadt Fachbereich Informatik"},{"key":"ref2","first-page":"2007","article-title":"Smart card implementation of anonymous credentials","author":"balasch","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"ref9","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"1997","journal-title":"Discrete Mathematics and Its Applications"}],"event":{"name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS 2009)","start":{"date-parts":[[2009,12,6]]},"location":"London","end":{"date-parts":[[2009,12,9]]}},"container-title":["2009 First IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377995\/5386439\/05386474.pdf?arnumber=5386474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T11:37:40Z","timestamp":1580816260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5386474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wifs.2009.5386474","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}