{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:34:46Z","timestamp":1725543286271},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_3","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"33-49","source":"Crossref","is-referenced-by-count":3,"title":["DSO: Dependable Signing Overlay"],"prefix":"10.1007","author":[{"given":"Guofei","family":"Gu","sequence":"first","affiliation":[]},{"given":"Prahlad","family":"Fogla","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Blough","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Anderson, R.J.: The eternity service, http:\/\/www.cl.cam.ac.uk\/users\/rja14\/eternity\/eternity.html"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cachin, C., Poritz, J.: Secure intrusion tolerant replication on the internet. In: DSN (2002)","DOI":"10.1109\/DSN.2002.1028897"},{"key":"3_CR3","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Security for peer-to-peer routing overlays. In: OSDI 2002 (December 2002)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (1985)","DOI":"10.1109\/SFCS.1985.64"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y.G. Desmedt","year":"1990","unstructured":"Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of IEEE 28th Annual Symposium on the Foundations of Computer Science (October 1987)","DOI":"10.1109\/SFCS.1987.4"},{"key":"3_CR7","unstructured":"The free haven project, http:\/\/www.freehaven.net\/"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Gu, G., Fogla, P., Lee, W., Blough, D.: DSO: Dependable Signing Overlay (full version) (2006), http:\/\/www.cc.gatech.edu\/~guofei\/paper\/Gu_ACNS06_DSO_full.pdf","DOI":"10.1007\/11767480_3"},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/6306.6308","volume":"4","author":"M. Herlihy","year":"1986","unstructured":"Herlihy, M.: A quorum-consensus replication method for abstract data types. ACM Trans. Comput. Syst.\u00a04(1), 32\u201353 (1986)","journal-title":"ACM Trans. Comput. Syst."},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-540-30576-7_28","volume-title":"Theory of Cryptography","author":"S. Jarecki","year":"2005","unstructured":"Jarecki, S., Saxena, N.: Further Simplifications in Proactive RSA Signatures. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 510\u2013528. Springer, Heidelberg (2005)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Saxena, N., Yi, J.H.: An attack on the proactive rsa signature scheme in the ursa ad hoc network access control protocol. In: SASN 2004, pp. 1\u20139. ACM Press, New York (2004)","DOI":"10.1145\/1029102.1029105"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Misra, V., Rubenstein, D.: SOS: Secure Overlay Services. In: ACM SIGCOMM 2002 (August 2002)","DOI":"10.1145\/633025.633032"},{"key":"3_CR14","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: ICNP 2001 (November 2001)"},{"key":"3_CR15","unstructured":"Kursawe, C.K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: ACM CCS 2002 (2002)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lakshmanan, S., Ahamad, M., Venkateswaran, H.: Responsive security for stored data. In: ICDCS 2003 (2003)","DOI":"10.1109\/ICDCS.2003.1203461"},{"key":"3_CR17","unstructured":"Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: ISCC 2002 (July 2002)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing\u00a011(4) (1998)","DOI":"10.1007\/s004460050050"},{"key":"3_CR19","unstructured":"Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in p2p and manets: The case of membership control. In: ICNP 2003 (2003)"},{"key":"3_CR20","unstructured":"Narasimha, M., Tsudik, G., Yi, J.H.: Efficient node admission for short-lived mobile ad hoc networks. In: ICNP 2005 (2005)"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BFb0055722","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"T. Rabin","year":"1998","unstructured":"Rabin, T.: A Simplified Approach to Threshold and Proactive RSA. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, p. 89. Springer, Heidelberg (1998)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, p. 329. Springer, Heidelberg (2001)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"B. Schoenmakers","year":"1999","unstructured":"Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 148. Springer, Heidelberg (1999)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Communications of ACM\u00a024(11) (1979)","DOI":"10.1145\/359168.359176"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Practical threshold signatures. In: Proceedings of EUROCRPT 2000 (2000)","DOI":"10.1007\/3-540-45539-6_15"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: ACM SIGCOMM 2001 (2001)","DOI":"10.1145\/383059.383071"},{"key":"3_CR27","unstructured":"Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proc. 9th USENIX Security Symposium, pp. 59\u201372 (August 2000)"},{"key":"3_CR28","unstructured":"Wu, T., Malkin, M., Boneh, D.: Building intrusion tolerant applications. In: Proceedings of 8th USENIX Security Symp. (Security 1999) (1999)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Networks\u00a013(6) (1999)","DOI":"10.1109\/65.806983"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, L., Schneider, F.B., Van Renesse, R.: A secure distributed online certification authority. ACM Transactions on Computer Systems\u00a020(4) (2002)","DOI":"10.1145\/571637.571638"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:35:44Z","timestamp":1555702544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11767480_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}