<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stefanos Gritzalis</style></author><author><style face="normal" font="default" size="100%">Dimitrios Lekkas</style></author><author><style face="normal" font="default" size="100%">Konstantinos Moulinos</style></author><author><style face="normal" font="default" size="100%">Eleni Polydorou</style></author><author><style face="normal" font="default" size="100%">Sokratis K. Katsikas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture</style></title><secondary-title><style face="normal" font="default" size="100%">Computers and Security Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">731-746</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">8</style></issue></record></records></xml>