{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:34Z","timestamp":1725797134643},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_27","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T11:39:43Z","timestamp":1135337983000},"page":"411-424","source":"Crossref","is-referenced-by-count":1,"title":["Collective Signature for Efficient Authentication of XML Documents"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Eunjong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","first-page":"136","volume-title":"Proceedings. of the 8 th ACM conference on Computer and Communications Security","author":"P Devanbu","year":"2001","unstructured":"P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, S. G. Stubblebine. \u201cFlexible Authentication of XML Document,\u201d Proceedings. of the 8\n\n                  th\n                \nACM conference on Computer and Communications Security, pp. 136\u2013145, November 2001."},{"key":"27_CR2","first-page":"274","volume-title":"Proceedings of EUROCRYPT\u201993: Advances in Cryptology","author":"JC Benaloh","year":"1993","unstructured":"J.C. Benaloh and M. de Mare. \u201cOne-way accumulators: A Decentralized Alternative to Digital Signatures,\u201d Proceedings of EUROCRYPT\u201993: Advances in Cryptology, Lecture Notes in Computer Science, vol. 765, pp 274\u2013285, Springer-Verlag, 1993."},{"key":"27_CR3","first-page":"369","volume-title":"Proceedings of Crypto \u201987: Advances in Cryptology","author":"R Merkle","year":"1987","unstructured":"R. Merkle, \u201cA Digital Signature Based on a Conventional Encryption Function,\u201d Proceedings of Crypto \u201987: Advances in Cryptology, Lecture Notes in Computer Science, vol. 293, pp.369\u2013378, Springer-Verlag, 1987."},{"key":"27_CR4","volume-title":"XML-Signature Syntax and processing","author":"D Eastlake","year":"2002","unstructured":"D. Eastlake, J. Reagle and D. Solo, \u201cXML-Signature Syntax and processing\u201d, W3C Recommendation, February 2002."},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/3-540-10843-2_43","volume-title":"Proceedings of the 8th Colloquium on Automata, Languages and Programming ICALP \u201981","author":"A Shamir","year":"1981","unstructured":"A. Shamir, \u201cOn the Generation of Cryptographically Strong PseudoRandom Sequences.\u201d Proceedings of the 8th Colloquium on Automata, Languages and Programming ICALP \u201981, Lecture Notes in Computer Science, vol. 115, pp 544\u2013550, Springer-Verlag, 1981."},{"key":"27_CR6","volume-title":"RFC 2803 Internet Society","author":"Digest Values for DOM (DOMHASH)","year":"2000","unstructured":"Digest Values for DOM (DOMHASH). RFC 2803 Internet Society, available from \n                  http:\/\/www.faqs.org\n                  \n                \/rfcs\/rfc2803.html, April 2000"},{"issue":"3","key":"27_CR7","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E Bertino","year":"2002","unstructured":"Elisa Bertino and Elena Ferrari, \u201cSecure and Selective Dissemination of XML Documents,\u201d ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pp. 290\u2013331","journal-title":"ACM Transactions on Information and System Security"},{"key":"27_CR8","volume-title":"XML Information Set","author":"J Cowan","year":"2001","unstructured":"J. Cowan, \u201cXML Information Set\u201d. W3C Recommendation, October 2001."},{"key":"27_CR9","volume-title":"SML Path Language (XPath)","author":"J Clark","year":"1999","unstructured":"J. Clark and S. DeRose, \u201cSML Path Language (XPath)\u201d. W3C Recommendation, November 1999."},{"key":"27_CR10","first-page":"234","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"R Merkle","year":"1989","unstructured":"R. Merkle, \u201cA Certified Digital Signature\u201d. In Advances in Cryptology-CRYPTO\u201989. Lecture Notes in Computer Science, vol. 435, pp 234\u2013246, Springer-Verlag 1989."},{"key":"27_CR11","first-page":"285","volume-title":"Proceedings of the 4th International Conference on Information Security and Cryptology (ICISC 2001)","author":"R Steinfeld","year":"2001","unstructured":"R. Steinfeld, L. Bull and Y. Zheng, \u201cContent Extraction Signatures\u201d, Proceedings of the 4th International Conference on Information Security and Cryptology (ICISC 2001), Lecture Notes in Computer Science, vol. 2288, pp. 285\u2013304, Springer-Verlag 2001."},{"key":"27_CR12","volume-title":"XML and Java, Developing Web Applications","author":"H Maruyama","year":"1999","unstructured":"H. Maruyama, K. Tamura, and N. Uramoto, \u201cXML and Java, Developing Web Applications,\u201d Addison Wesley 1999."},{"key":"27_CR13","volume-title":"Proceedings of the 3rd International Workshop on Fast Softtware Encryption","author":"R Nyberg","year":"1996","unstructured":"R. Nyberg, \u201cFast Accumulated Hashing\u201d, Proceedings of the 3rd International Workshop on Fast Softtware Encryption. Cambridge, U.K. 1996. Published as D. Gollman editor, Lecture Notes in Computer Science, vol. 1039, pp 83\u201387, Springer-Verlag 1996."},{"key":"27_CR14","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Proceedings ofEUROCRYPT \u201997: Advances in Cryptology","author":"N Baric","year":"1997","unstructured":"N. Baric and B. Pfitzmann, \u201cCollision-free accumulators and failstop signature schemes without trees\u201d, Proceedings ofEUROCRYPT \u201997: Advances in Cryptology. Lecture Notes in Computer Science vol. 1233, pp 480\u2013494. Springer-Verlag 1997."},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/3-540-48910-X_9","volume-title":"Proceedings of EUROCRYPT \u201999: Advances in Cryptology","author":"R Gennaro","year":"1999","unstructured":"R. Gennaro, S. Halevi and T. Rabin, \u201cSecure Hash-and-Sign Signatures Without the Random Oracle\u201d Proceedings of EUROCRYPT \u201999: Advances in Cryptology. Lecture Notes in Computer Science, vol. 1592, pp 123\u2013139, Springer-Verlag 1999."},{"key":"27_CR16","first-page":"252","volume-title":"Proceedings of the 2th International Conference on Information and Communications Security 1999 (ICICS 1999)","author":"T Sander","year":"1999","unstructured":"T. Sander, \u201cEfficient Accumulators Without Trapdoor\u201d, Proceedings of the 2th International Conference on Information and Communications Security 1999 (ICICS 1999). Lecture Notes in Computer Science, vol. 1726, pp 252\u2013262, Springer-Verlag 1999."},{"key":"27_CR17","first-page":"53","volume-title":"Proceedings of Financial Cryptography \u201900, 2000","author":"T Sander","year":"1962","unstructured":"T. Sander, A. T-Shma and M. Yung, \u201cBlind, Auditable Membership Proofs\u201d, Proceedings of Financial Cryptography \u201900, 2000. Lecture Notes in Computer Science, vol. 1962, pp 53\u201371, Springer-Verlag 2000."},{"key":"27_CR18","first-page":"372","volume-title":"Proceedings of the 5th International Conference on Information Security, 2002","author":"MT Goodrich","year":"2002","unstructured":"M. T. Goodrich, R. Tamassia and J. Hasic \u201cAn Efficient, Dynamic and Distributed Cryptographic Accumulator\u201d, Proceedings of the 5th International Conference on Information Security, 2002. Lecture Notes in Computer Science, vol. 2433, pp 372\u2013388, Springer-Verlag 2002."}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T22:43:41Z","timestamp":1549493021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_27","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}