{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:11:00Z","timestamp":1725466260550},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540645641"},{"type":"electronic","value":"9783540694335"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053398","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T03:27:11Z","timestamp":1149650831000},"page":"11-25","source":"Crossref","is-referenced-by-count":2,"title":["Symmetric adaptive customer modeling for electronic commerce in a distributed environment"],"prefix":"10.1007","author":[{"given":"Maria","family":"Barra","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Cattaneo","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Izzo","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Negro","sequence":"additional","affiliation":[]},{"given":"Vittorio","family":"Scarano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi and R. Needham. \u201cPrudent engineering practice for cryptographic protocols\u201d. 1994.","DOI":"10.1109\/RISP.1994.296587"},{"key":"2_CR2","volume-title":"Information Theory","author":"R.B. Ash","year":"1965","unstructured":"R.B.Ash. \u201cInformation Theory\u201d. Dover Publications,Inc. New York 1965."},{"key":"2_CR3","unstructured":"D.Denning \u201cCryptography and Data Security\u201d. Addison-Wesley Publ., 1983"},{"key":"2_CR4","unstructured":"M.Barra, G.Cattaneo, A.Negro, V.Scarano. \u201cSymmetric Adaptive Customer Modeling in an Electronic Store\u201d. Submitted for publication, 1997."},{"key":"2_CR5","unstructured":"T. Berners-Lee. \u201cWorld Wide Web Initiative\u201d. WWW Home Page. [URL: http:\/\/info. cern.ch\/hypertext\/WWW\/TheProject.html]"},{"issue":"4\u20135","key":"2_CR6","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/0169-7552(92)90039-S","volume":"25","author":"T. Berners-Lee","year":"1992","unstructured":"T. Berners-Lee, R. Cailliau, J.F.Groff. \u201cThe World Wide Web\u201d. Computer Networks and ISDN Systems, Nov. 1992, vol.25 (no.4\u20135), 454\u20139.","journal-title":"Computer Networks and ISDN Systems"},{"key":"2_CR7","unstructured":"T. Berners-Lee. \u201cHypertext Transfer Protocol. Internet Draft."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"D. Dwyer, K. Barbieri, H.M. Doerr. \u201cCreating a Virtual Classroom for Interactive Education on the Web\u201d. Proc. of WWW 95, Third Int. Conf. on World Wide Web.","DOI":"10.1016\/0169-7552(95)00037-8"},{"key":"2_CR9","unstructured":"V. Bush. \u201cMemex Revisited?. In Science is not enough, W. Morrow and Co. Reprinted in Nyce, J.M. and Kahn, P. (Eds.) (1991), Prom to Hypertext: Vannevar Bush and the Mind's Machine. Academic Press."},{"key":"2_CR10","unstructured":"D.Cameron. \u201cElectronic Commerce. The New Business Platform for the Internet \u201c. Computer Tecnology Research Corp. 1997."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"S. Ferrandino, A. Negro, V. Scarano. \u201cCheops: Adaptive Hypermedia on World Wide Web\u201d. Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services (IDMS '97), 10\u201312 Sett, 1997. Ed. Springer-Verlag (LNCS).","DOI":"10.1007\/BFb0000353"},{"key":"2_CR12","unstructured":"R.Fielding, H. Frystyck, T. Berners-Lee. \u201cHypertext Transfer Protocol, http 1.1\u201d. HTTP Working Group Internet Draft."},{"key":"2_CR13","unstructured":"N. Hammond, L. Allison. \u201cExtending Hypertext for learning: An investigation of access and guidance tools\u201d. In Sutcliffe,A. and Macaulay, L. (Eds.): People and Computers, Cambridge University Press, 1989."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"B. Ibrahim, S.D. Franklin. \u201cAdvanced Educational Uses of the World Wide Web\u201d. Proc. of WWW95, 3rd International Conference on World Wide Web.","DOI":"10.1016\/0169-7552(95)00014-X"},{"key":"2_CR15","unstructured":"Microsoft Corporation. \u201cMerchant Server on-line documentation\u201d. from CD-ROM of Merchant Server 1.0 version."},{"key":"2_CR16","unstructured":"J. Nielsen. \u201cHypertext and Hypermedia\u201d. Academic Press Ltd, 1990."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"R. Rivest. RFC 1319: The MD2 Message Digest Algorithm. April 1992.","DOI":"10.17487\/rfc1320"},{"key":"2_CR18","unstructured":"B. Schneier. \u201cApplied Cryptography: Protocols, Algorithms, and Source Code in C\u201d, Published by John Wiley & Sons, Inc. 1994."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"C.E. Shannon. \u201cA Mathematical Theory of Communication\u201d, Bell System Tech. J., 27, pp.379\u2013423, 623\u2013656.","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"}],"container-title":["Lecture Notes in Computer Science","Trends in Distributed Systems for Electronic Commerce"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T02:44:15Z","timestamp":1555641855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645641","9783540694335"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/bfb0053398","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}