A Privilege Separation Method for Security Commercial Transactions.
Y. Chen, J. Hu, X. Gai, and Y. Sun. e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-192. Springer, (2010)
@inproceedings{conf/eforensics/ChenHGS10,
added-at = {2015-03-12T00:00:00.000+0100},
author = {Chen, Yasha and Hu, Jun and Gai, Xinmao and Sun, Yu},
biburl = {https://www.bibsonomy.org/bibtex/2084645040cf9355f1482586e41b2c9d8/dblp},
booktitle = {e-Forensics},
crossref = {conf/eforensics/2010},
editor = {Lai, Xuejia and Gu, Dawu and Jin, Bo and Wang, Yongquan and Li, Hui},
ee = {http://eudl.eu/doi/10.1007/978-3-642-23602-0_17},
interhash = {09defac3e318eb1e863612fad79c772f},
intrahash = {084645040cf9355f1482586e41b2c9d8},
isbn = {978-3-642-23601-3},
keywords = {dblp},
pages = {185-192},
publisher = {Springer},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2015-06-18T19:01:34.000+0200},
title = {A Privilege Separation Method for Security Commercial Transactions.},
url = {http://dblp.uni-trier.de/db/conf/eforensics/eforensics2010.html#ChenHGS10},
volume = 56,
year = 2010
}