{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:10:12Z","timestamp":1725484212654},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540436775"},{"type":"electronic","value":"9783540478706"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-47870-1_7","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:16:44Z","timestamp":1179731804000},"page":"106-125","source":"Crossref","is-referenced-by-count":0,"title":["Secure Open Systems for Protecting Privacy and Digital Services"],"prefix":"10.1007","author":[{"given":"David","family":"Kravitz","sequence":"first","affiliation":[]},{"given":"Kim-Ee","family":"Yeoh","sequence":"additional","affiliation":[]},{"given":"Nicol","family":"So","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,5,7]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"B. Askwith, M. Merabti, Q. Shi, and K. Whiteley. Achieving user privacy in mobile networks. In Proceedings of the 13th Annual Computer Security Applications Conference, 1997.","DOI":"10.1109\/CSAC.1997.646180"},{"issue":"2\/3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/BF01185212","volume":"12","author":"M. Blum","year":"1994","unstructured":"M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12(2\/3), pp. 225\u2013244, 1994.","journal-title":"Algorithmica"},{"key":"7_CR3","unstructured":"L. Butty\u00e1n and J.-P. Hubaux. Accountable Anonymous Access to Services in Mobile Communication Systems. In Proceedings of SRDS\u2019 99, 1999."},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","first-page":"89","volume-title":"Advances in Cryptology: Crypto\u2019 92","author":"D. Chaum","year":"1992","unstructured":"D. Chaum and T. P. Pedersen. Wallet databases with observers. In Advances in Cryptology: Crypto\u2019 92, E. F. Brickell, Ed., Lecture Notes in Computer Science 740, pp. 89\u2013105, Springer-Verlag, 1992."},{"key":"7_CR5","volume-title":"The Digital Dilemma: Intellectual Property in the Information Age","author":"Committee on Intellectual Property Rights in the Emerging Information Infrastructure","year":"2000","unstructured":"Committee on Intellectual Property Rights in the Emerging Information Infrastructure. The Digital Dilemma: Intellectual Property in the Information Age. Washington, D. C., National Academy Press, 2000."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"G. Horn and B. Preneel. Authentication and payment in future mobile systems. In Proceedings of ESORICS\u2019 98, 1998.","DOI":"10.1007\/BFb0055870"},{"key":"7_CR7","unstructured":"B. Kaliski. New Challenges in Embedded Security. Consortium for Efficient Embedded Security, Symposium on Embedded Security, Security Ownership and Trust Models, July 10, 2001 ( www.ceesstandards.org )."},{"key":"7_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"Advances in Cryptology: Crypto\u2019 97","author":"C. H. Lim","year":"1997","unstructured":"C. H. Lim and P. J. Lee. A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup. In Advances in Cryptology: Crypto\u2019 97, B. S. Kaliski, Jr., Ed., Lecture Notes in Computer Science 1294, pp. 249\u2013263, Springer-Verlag, 1997."},{"key":"7_CR9","unstructured":"J. Manferdelli. Digital Rights Management (\u201cDRM\u201d). Consortium for Efficient Embedded Security, Symposium on Embedded Security, Security Ownership and Trust Models, July 10, 2001 ( www.ceesstandards.org )."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"K. Martin, B. Preneel, C. Mitchell, H. Hitz, A. Poliakova, and P. Howard. Secure billing for mobile information services in UMTS. In Proceedings of IS&N\u201998, 1998.","DOI":"10.1007\/BFb0056997"},{"key":"7_CR11","volume-title":"Technical Report 7","author":"R. Mori","year":"1990","unstructured":"R. Mori and M. Kawahara. Superdistribution: the concept and the architecture. Technical Report 7, Inst. of Inf. Sci. & Electron (Japan), Tsukuba Univ., Japan, July 1990."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"B. Patel and J. Crowcroft. Ticket based service access for the mobile user. In Proceedings of Mobicom\u2019 97, 1997.","DOI":"10.1145\/262116.262150"},{"key":"7_CR13","unstructured":"S. Pugh, The Need for Embedded Security. Consortium for Efficient Embedded Security, Symposium on Embedded Security, Security Ownership and Trust Models, July 10, 2001 ( www.ceesstandards.org )."},{"key":"7_CR14","unstructured":"M. O. Rabin. Digitalized Signatures and Public-key Functions as Intractable as Factorization. MIT Laboratory for Computer Science Technical Report 212 (MIT\/LCS\/TR-212), 1979."},{"key":"7_CR15","unstructured":"M. Rotenberg. Consumer Implications of Security Applications. Consortium for Efficient Embedded Security, Symposium on Embedded Security, Security Ownership and Trust Models, July 10, 2001 ( www.ceesstandards.org )."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"S. Smith. Secure coprocessing applications and research issues. Los Alamos Unclassified Release LA-UR-96-2805, August 1996.","DOI":"10.2172\/366464"},{"key":"7_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030438","volume-title":"Proceedings, Second International Conference on Financial Cryptography","author":"S. W. Smith","year":"1998","unstructured":"S. W. Smith, E. R. Palmer, S. H. Weingart. Using a High-Performance, Programmable Secure Coprocessor. In Proceedings, Second International Conference on Financial Cryptography. Springer-Verlag LNCS, 1998."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"M. Stefik. Trusted Systems, Scientific American 276(3), March 1997, pp. 78\u201381.","DOI":"10.1038\/scientificamerican0397-78"},{"key":"7_CR19","unstructured":"U. Wilhelm, S. Staamann, and L. Butty\u00e1n. On the problem of trust in mobile agent systems. In Proceedings of NDSS\u2019 98, 1998."},{"key":"7_CR20","unstructured":"http:\/\/www.verisign.com\/developer\/notice\/authenticode\/"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47870-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:25:09Z","timestamp":1556418309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47870-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540436775","9783540478706"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-47870-1_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}