{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:18:13Z","timestamp":1725477493235},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540690832"},{"type":"electronic","value":"9783540690849"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11962977_22","type":"book-chapter","created":{"date-parts":[[2007,1,19]],"date-time":"2007-01-19T05:55:24Z","timestamp":1169186124000},"page":"273-284","source":"Crossref","is-referenced-by-count":19,"title":["A Framework for Secure and Verifiable Logging in Public Communication Networks"],"prefix":"10.1007","author":[{"given":"Vassilios","family":"Stathopoulos","sequence":"first","affiliation":[]},{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Schneier, B.: Schneier on security: Phone tapping in Greece (2006), web page: http:\/\/www.schneier.com\/blog\/archives\/02\/phone_tapping_i.html"},{"key":"22_CR2","unstructured":"Kelsey, J., Callas, J.: Ssyslog-sign protocol. DRAFT, Network Working Group (2002)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Dunlap, G.W., King, S.T., Cinar, S., Basrai, M., Chen, P.M.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In: Proc. 2002 Symp. Operating Sys. Design and Implementation (2002)","DOI":"10.1145\/1060289.1060309"},{"key":"22_CR4","unstructured":"Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of California at San Diego (1997)"},{"key":"22_CR5","unstructured":"Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th USENIX Security Symposium, pp. 53\u201362. USENIX Press (1998)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.: How to time-stamp a digital document. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 437\u2013455. Springer, Heidelberg (1991)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamperresistant hardware. Tech. Rep., Universiteit Twente, Enschede, The Netherlands (2002)","DOI":"10.1007\/978-0-387-35691-4_7"},{"key":"22_CR8","unstructured":"Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: The 11th Annual Network and Distributed System Security Symposium (2004)"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/0-387-33406-8_28","volume-title":"Security and Privacy in Dynamic Environments","author":"R. Accorsi","year":"2006","unstructured":"Accorsi, R.: On the relationship of privacy and secure remote logging in dynamic systems. In: Security and Privacy in Dynamic Environments, vol.\u00a0201, pp. 329\u2013338. Springer, Heidelberg (2006)"},{"key":"22_CR10","unstructured":"Holt, J.: Logcrypt: Forward security and public verification for secure audit logs. In: Proc. of Australasian Information Security Workshop (2006)"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/IAW.2005.1495955","volume-title":"Proc. Of IEEE 6th Information Assurance Workshop","author":"N. Kawaguchi","year":"2005","unstructured":"Kawaguchi, N., Obata, N., Ueda, S., Azuma, Y., Shigeno, H., Okada, K.: Efficient log authentication for forensic computing. In: Proc. Of IEEE 6th Information Assurance Workshop, pp. 215\u2013223. IEEE, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11962977_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:32Z","timestamp":1619508152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11962977_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540690832","9783540690849"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11962977_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}