{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:32:47Z","timestamp":1729639967085,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/ainaw.2007.10","type":"proceedings-article","created":{"date-parts":[[2010,12,3]],"date-time":"2010-12-03T18:07:28Z","timestamp":1291399648000},"page":"525-530","source":"Crossref","is-referenced-by-count":7,"title":["A Certified Email Protocol Using Key Chains"],"prefix":"10.1109","author":[{"given":"J.","family":"Cederquist","sequence":"first","affiliation":[]},{"given":"M. Torabi","family":"Dashti","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mauw","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.40"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277717"},{"year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984335"},{"year":"0","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967985"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128828"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_4"},{"journal-title":"Optimistic protocols for multi-party fair exchange","year":"1996","author":"asokan","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-003-0019-3"},{"key":"37","first-page":"428","article-title":"An attack on a protocol for certified delivery","volume":"2433","author":"monteiro","year":"2002","journal-title":"ser LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872038"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_3"},{"key":"21","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10207-004-0063-7","article-title":"On the security of fair non-repudiation protocols","volume":"4","author":"gtu?rgens","year":"2005","journal-title":"Int J Inf Sec"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/46.1.55"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277717"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008913"},{"key":"22","first-page":"297","article-title":"A method for fast revocation of public key certificates and security capabilities","author":"boneh","year":"2001","journal-title":"10th USENIX security symposium"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"25","first-page":"1","article-title":"Keying hash functions for message authentication","author":"bellare","year":"1996","journal-title":"CRYPTO'96"},{"key":"26","first-page":"17","article-title":"Finding collisions in the full SHA-1","author":"wang","year":"2005","journal-title":"CRYPTO'05"},{"key":"27","first-page":"423","article-title":"Efficient constructions for oneway hash chains","volume":"3531","author":"hu","year":"2005","journal-title":"ser LNCS"},{"journal-title":"Advanced Encryption Standard (AES)","first-page":"197","year":"2001","key":"28"},{"journal-title":"The Design of Rijndael AES ?The Advanced Encryption Standard","year":"2002","author":"daemen","key":"29"},{"journal-title":"Relations among Public Key Signature Systems","year":"1980","author":"even","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.50372"},{"key":"10","first-page":"591","article-title":"Optimistic fair exchange of digital signatures","volume":"1403","author":"asokan","year":"1998","journal-title":"ser LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/302350.302353"},{"key":"7","article-title":"A certified E-mail protocol","author":"riordan","year":"1998","journal-title":"14th Annual Computer Security Applications Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF02139147"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49248-8_12"},{"key":"5","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-61770-1_35","article-title":"Certified electronic mail","author":"zhou","year":"1996","journal-title":"ESORICS'96"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"4","first-page":"3","article-title":"Certified electronic mail","author":"bahreman","year":"1994","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511497"}],"event":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","start":{"date-parts":[[2007,5,21]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2007,5,23]]}},"container-title":["21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4221005\/4221006\/04221111.pdf?arnumber=4221111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:50:42Z","timestamp":1497876642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4221111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ainaw.2007.10","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}