<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eiji Okamoto</style></author><author><style face="normal" font="default" size="100%">Jose L. Vivas</style></author><author><style face="normal" font="default" size="100%">Jose A. Montenegro</style></author><author><style face="normal" font="default" size="100%">Javier Lopez</style></author><author><style face="normal" font="default" size="100%">Ed Dawson</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Specification and Design of Advanced Authentication Authorization Services</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Standards and Interfaces</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">467–78.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Masahiro Mambo</style></author><author><style face="normal" font="default" size="100%">Eiji Okamoto</style></author><author><style face="normal" font="default" size="100%">Keisuke Usuda</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proxy Signatures: Delegation of the Power to Sign Messages</style></title><secondary-title><style face="normal" font="default" size="100%">IEICE Transactions on Fundamentals</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><pages><style face="normal" font="default" size="100%">1338-1354</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Masahiro Mambo</style></author><author><style face="normal" font="default" size="100%">Eiji Okamoto</style></author><author><style face="normal" font="default" size="100%">Keisuke Usuda</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proxy Signatures for Delegating Signing Operation</style></title><secondary-title><style face="normal" font="default" size="100%">3rd ACM Conference on Computer and Communications Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM Press New York</style></publisher><pub-location><style face="normal" font="default" size="100%">New Delhi, India</style></pub-location><pages><style face="normal" font="default" size="100%">48-57.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>