{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T08:47:15Z","timestamp":1714294035623},"reference-count":12,"publisher":"Elsevier","isbn-type":[{"value":"9780127224428","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1016\/b978-012722442-8\/50123-3","type":"book-chapter","created":{"date-parts":[[2007,9,4]],"date-time":"2007-09-04T12:42:39Z","timestamp":1188909759000},"page":"1133-1136","source":"Crossref","is-referenced-by-count":1,"title":["Chip-Secured Data Access"],"prefix":"10.1016","author":[{"given":"Luc","family":"Bouganim","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois Dang","family":"Nogc","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[]},{"given":"Lilan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-012722442-8\/50123-3_bib1","series-title":"Int. Conf. on Very Large Data Bases","article-title":"Hippocratic Databases","author":"Agrawal","year":"2002"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib2","article-title":"Chip-Secured Data Access: Confidential Data on Untrusted Servers","author":"Bouganim","year":"2002"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib3","series-title":"Security In Databases: A Survey Study","author":"Baraani","year":"1996"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib6","series-title":"Int. Database and Engineering and Application Symposium","article-title":"Cryptography and Relational Database Management Systems","author":"He","year":"2001"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib7","series-title":"ACM SIGMOD","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"Hacigumus","year":"2002"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib8","series-title":"ISO\/IEC","article-title":"Integrated Circuit(s) Cards with Contacts \u2014 Part 1: Physical Characteristics","author":"International Standardization Organization (ISO)","year":"1998"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib9","series-title":"Secure. Data Functional Overview","author":"Mattsson","year":"2000"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib10","series-title":"Advanced Security Administrator Guide","author":"Oracle Corp.","year":"2002"},{"issue":"2\u20133","key":"10.1016\/B978-012722442-8\/50123-3_bib11","article-title":"PicoDBMS: Scaling down Database Techniques for the Smartcard","volume":"10","author":"Pucheral","year":"2001","journal-title":"VLDB Journal (VLDBJ)"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib13","series-title":"USENIX Symposium on Smart Cards","article-title":"Breaking up is hard to do: Modeling Security Threats for Smart Cards","author":"Schneier","year":"1999"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib16","author":"Microsystems","year":"1999","journal-title":"JavaCard 2.1 API Specification"},{"key":"10.1016\/B978-012722442-8\/50123-3_bib18","doi-asserted-by":"crossref","DOI":"10.1109\/40.798109","article-title":"MASSC: A Generic Architecture for Multiapplication Smart Cards","author":"Tual","year":"1999","journal-title":"IEEE Micro Journal"}],"container-title":["Proceedings 2003 VLDB Conference"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T21:22:51Z","timestamp":1546636971000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780127224428501233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9780127224428"],"references-count":12,"URL":"http:\/\/dx.doi.org\/10.1016\/b978-012722442-8\/50123-3","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}