{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:34:30Z","timestamp":1742942070213,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319095806"},{"type":"electronic","value":"9783319095813"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09581-3_1","type":"book-chapter","created":{"date-parts":[[2014,8,2]],"date-time":"2014-08-02T11:20:14Z","timestamp":1406978414000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Keynote Talk: Communication Without Repudiation: The Unanswered Question"],"prefix":"10.1007","author":[{"given":"Mohamed G.","family":"Gouda","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,3]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/0920-5489(94)00044-H","volume":"17","author":"S Herda","year":"1995","unstructured":"Herda, S.: Non-repudiation: constituting evidence and proof in digital cooperation. Comput. Stand. Interf. 17(1), 69\u201379 (1995)","journal-title":"Comput. Stand. Interf."},{"key":"1_CR2","unstructured":"Cox, B., Tygar, D., Sirbu, M.: NetBill security and transaction protocol. In: Proceedings of USENIX Workshop on Electronic Commerce, pp. 77\u201388, July 1995"},{"key":"1_CR3","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55\u201361, May 1996"},{"key":"1_CR4","unstructured":"Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 126\u2013132, June 1997"},{"key":"1_CR5","unstructured":"Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. In: Proceedings of the Conference on Security in Communication Networks, September 1999"},{"issue":"7\u20138","key":"1_CR6","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.cose.2008.07.005","volume":"27","author":"J Hernandez-Ardieta","year":"2008","unstructured":"Hernandez-Ardieta, J., Gonzalez-Tablas, A., Alvarez, B.: An optimistic fair exchange protocol based on signature policies. Comput. Secur. 27(7\u20138), 309\u2013322 (2008)","journal-title":"Comput. Secur."},{"issue":"17","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1016\/S0140-3664(02)00049-X","volume":"25","author":"S Kremer","year":"2002","unstructured":"Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17), 1606\u20131621 (2002)","journal-title":"Comput. Commun."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Muntean, C., Dojen, R., Coffey, T.: Establishing and preventing a new replay attack on a non-repudiation protocol. In: Proceedings of the 5-th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 283\u2013290, August 2009","DOI":"10.1109\/ICCP.2009.5284749"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-17650-0_18","volume-title":"Information and Communications Security","author":"M Chen","year":"2010","unstructured":"Chen, M., Wu, K., Xu, J., He, P.: A new method for formalizing optimistic fair exchange protocols. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 251\u2013265. Springer, Heidelberg (2010)"},{"key":"1_CR10","series-title":"The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-0-387-35515-3_28","volume-title":"Information Security for Global Information Infrastructures","author":"S Kremer","year":"2000","unstructured":"Kremer, S., Markowitch, O.: A multi-party non-repudiation protocol. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. IFIP, vol. 47, pp. 271\u2013280. Springer, Heidelberg (2000)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/3-540-45247-8_9","volume-title":"Information Security and Cryptology - ICISC 2000","author":"O Markowitch","year":"2001","unstructured":"Markowitch, O., Kremer, S.: A multi-party optimistic non-repudiation protocol. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 109\u2013122. Springer, Heidelberg (2001)"},{"issue":"5","key":"1_CR12","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1108\/09685220510627250","volume":"13","author":"J Zhou","year":"2005","unstructured":"Zhou, J., Onieva, J., Lopez, J.: Optimized multi-party certified email protocols. Inf. Manag. Comput. Secur. 13(5), 350\u2013366 (2005)","journal-title":"Inf. Manag. Comput. Secur."},{"issue":"2","key":"1_CR13","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cose.2009.06.009","volume":"29","author":"J Ferrer-Gomilla","year":"2010","unstructured":"Ferrer-Gomilla, J., Onieva, J., Payeras, M., Lopez, J.: Certified electronic mail: properties revisited. Comput. Secur. 29(2), 167\u2013179 (2010)","journal-title":"Comput. Secur."},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2007.15","volume":"5","author":"R Oppliger","year":"2007","unstructured":"Oppliger, R.: Providing certified mail services on the Internet. IEEE Secur. Priv. 5(1), 16\u201322 (2007)","journal-title":"IEEE Secur. Priv."},{"issue":"6\u20137","key":"1_CR15","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.cose.2011.05.001","volume":"30","author":"A Tauber","year":"2011","unstructured":"Tauber, A.: A survey of certified mail systems provided on the Internet. Comput. Secur. 30(6\u20137), 464\u2013485 (2011)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09581-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T09:48:17Z","timestamp":1676886497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09581-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319095806","9783319095813"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09581-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"3 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}