{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:14:28Z","timestamp":1725556468500},"reference-count":11,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscc.2003.1214128","type":"proceedings-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T17:17:26Z","timestamp":1080667046000},"page":"238-243","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of an efficient authenticated dictionary for certificate revocation"],"prefix":"10.1109","author":[{"given":"J.L.","family":"Munoz","sequence":"first","affiliation":[]},{"given":"J.","family":"Forne","sequence":"additional","affiliation":[]},{"given":"O.","family":"Esparza","sequence":"additional","affiliation":[]},{"given":"M.","family":"Soriano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2246"},{"journal-title":"Data structures and algorithms","year":"1988","author":"aho","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"journal-title":"RFC 2510","article-title":"Internet 509 public key infrastructure certificate management protocols","year":"1999","author":"adams","key":"1"},{"journal-title":"Efficient certificate revocation","year":"1996","author":"micali","key":"7"},{"key":"6","first-page":"234","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Advances in Cryptology (CRYPTO89) Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/BFb0055481","article-title":"On certificate revocation and validation","author":"kocher","year":"1998","journal-title":"International Conference on Financial Cryptography (FC98) Lecture Notes in Computer Science"},{"year":"2000","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2002.1045949"},{"key":"8","first-page":"15","article-title":"NOVOMODO. Scalable Certificate Validation and Simplified PKI Management","author":"micali","year":"2002","journal-title":"1st Annual PKI Research Workshop"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/49.839932"}],"event":{"name":"ISCC 2003 - International Symposium on Computers and Communications","acronym":"ISCC-03","location":"Kemer-Antalya, Turkey"},"container-title":["Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8616\/27298\/01214128.pdf?arnumber=1214128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:34:55Z","timestamp":1497573295000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1214128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iscc.2003.1214128","relation":{},"subject":[]}}