{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:57:47Z","timestamp":1742943467498,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540446019"},{"type":"electronic","value":"9783540446057"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11863908_3","type":"book-chapter","created":{"date-parts":[[2006,9,15]],"date-time":"2006-09-15T23:28:46Z","timestamp":1158362926000},"page":"34-48","source":"Crossref","is-referenced-by-count":24,"title":["TrustedPals: Secure Multiparty Computation Implemented with Smart Cards"],"prefix":"10.1007","author":[{"given":"Milan","family":"Fort","sequence":"first","affiliation":[]},{"given":"Felix","family":"Freiling","sequence":"additional","affiliation":[]},{"given":"Lucia Draque","family":"Penso","sequence":"additional","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Dogan","family":"Kesdogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Trustedpals source code (April 2006), downloadable from: \n                  \n                    http:\/\/pi1.informatik.uni-mannheim.de"},{"key":"3_CR2","unstructured":"ActiveMQ, \n                  \n                    http:\/\/activemq.codehaus.org"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/11408901_5","volume-title":"Dependable Computing - EDCC 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., G\u00e4rtner, F.C., Guerraoui, R., Vukoli\u0107, M.: Gracefully degrading fair exchange with security modules. In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol.\u00a03463, pp. 55\u201371. Springer, Heidelberg (2005)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Avoine, G., Vaudenay, S.: Fair exchange with guardian angels. In: The 4th International Workshop on Information Security Applications \u2013 WISA 2003, Jeju Island, Korea (August 2003)","DOI":"10.1007\/978-3-540-24591-9_15"},{"key":"3_CR5","first-page":"1","volume-title":"Proceedings of the 20th Annual Symposium on Theory of Computing (STOC)","author":"M. Ben-Or","year":"1988","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th Annual Symposium on Theory of Computing (STOC), Chicago, IL USA, pp. 1\u201310. ACM Press, New York (1988)"},{"key":"3_CR6","unstructured":"Benenson, Z., G\u00e4rtner, F.C., Kesdogan, D.: Secure multi-party computation with security modules. Technical Report AIB-10-2004, RWTH Aachen (December 2004)"},{"key":"3_CR7","first-page":"11","volume-title":"Proceedings of the 20th Annual ACM Symposium on the Theory of Computing","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Crepeau, C., Damg\u00e5rd, I.: Multiparty unconditionally secure protocols. In: Cole, R. (ed.) Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, Chicago, IL, pp. 11\u201319. ACM Press, New York (1988)"},{"key":"3_CR8","volume-title":"Java Card Technology for Smart Cards","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards, 1st edn. Addison-Wesley Professional, Reading (2000)","edition":"1"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/11560647_26","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2005","author":"C. Delporte-Gallet","year":"2005","unstructured":"Delporte-Gallet, C., Fauconnier, H., Freiling, F.C.: Revisiting failure detection and consensus in omission failure environments. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, pp. 394\u2013408. Springer, Heidelberg (2005)"},{"issue":"10","key":"3_CR10","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.955100","volume":"34","author":"J.G. Dyer","year":"2001","unstructured":"Dyer, J.G., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.W., Weingart, S.: Building the IBM 4758 secure coprocessor. IEEE Computer\u00a034(10), 57\u201366 (2001)","journal-title":"IEEE Computer"},{"key":"3_CR11","unstructured":"Fowler, M.: Inversion of Control Containers and the Dependency Injection Pattern, \n                  \n                    http:\/\/martinfowler.com\/articles\/injection.html"},{"key":"3_CR12","unstructured":"Spring Framework, \n                  \n                    http:\/\/www.springframework.org"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/11795490_7","volume-title":"Principles of Distributed Systems","author":"F.C. Freiling","year":"2006","unstructured":"Freiling, F.C., Herlihy, M.P., Penso, L.D.: Optimal randomized fair exchange with secret shared coins. In: Anderson, J.H., Prencipe, G., Wattenhofer, R. (eds.) OPODIS 2005. LNCS, vol.\u00a03974, pp. 61\u201372. Springer, Heidelberg (2006)"},{"key":"3_CR14","unstructured":"Goldreich, O.: Secure multi-party computation (2002), Internet: \n                  \n                    http:\/\/www.wisdom.weizmann.ac.il\/~oded\/pp.html"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game \u2014 a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on the Theory of Computing (STOC), pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"3_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-55969-3","volume-title":"Smart Card Application Development Using Java","author":"U. Hansmann","year":"2002","unstructured":"Hansmann, U., Nicklous, M., Sch\u00e4ck, T., Schneider, A., Seliger, F.: Smart Card Application Development Using Java, 2nd edn. Springer, Heidelberg (2002)","edition":"2"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Hirt, M., Maurer, U., Przydatek, B.: Efficient secure multi-party computation. In: Proceedings of Asiacrypt (2000)","DOI":"10.1007\/3-540-44448-3_12"},{"key":"3_CR18","unstructured":"Iliev, A., Smith, S.: More efficient secure function evaluation using tiny trusted third parties. Technical Report TR2005-551, Dartmouth College, Computer Science, Hanover, NH (July 2005)"},{"issue":"3","key":"3_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"MacKenzie, P., Oprea, A., Reiter, M.K.: Automatic generation of two-party computations. In: SIGSAC: 10th ACM Conference on Computer and Communications Security. ACM SIGSAC (2003)","DOI":"10.1145\/948109.948139"},{"key":"3_CR21","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay \u2014 A secure two-party computation system. In: Proceedings of the 13th USENIX Security Symposium, USENIX (August 2004)"},{"key":"3_CR22","unstructured":"Parv\u00e9dy, P.R., Raynal, M.: Uniform agreement despite process omission failures. In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003). IEEE Computer Society, Los Alamitos (April 2003); appears also as IRISA Technical Report Number PI-1490 (November 2002)"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreements in the presence of faults. Journal of the ACM\u00a027(2), 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"issue":"3","key":"3_CR24","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1109\/TSE.1986.6312888","volume":"12","author":"K.J. Perry","year":"1986","unstructured":"Perry, K.J., Toueg, S.: Distributed agreement in the presence of processor and communication faults. IEEE Transactions on Software Engineering\u00a012(3), 477\u2013482 (1986)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"issue":"4","key":"3_CR26","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"F.B. Schneider","year":"1990","unstructured":"Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys\u00a022(4), 299\u2013319 (1990)","journal-title":"ACM Computing Surveys"},{"key":"3_CR27","unstructured":"Trusted Computing Group. Trusted computing group homepage (2003), Internet: \n                  \n                    https:\/\/www.trustedcomputinggroup.org\/"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/SFCS.1982.38","volume-title":"23th Annual Symposium on Foundations of Computer Science (FOCS 1982)","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocols for secure computations (extended abstract). In: 23th Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160\u2013164. IEEE Computer Society Press, Los Alamitos (1982)"},{"issue":"4","key":"3_CR29","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L. Zhou","year":"2002","unstructured":"Zhou, L., Schneider, F.B., van Renesse, R.: COCA: A secure distributed on-line certification authority. TOCS\u00a020(4), 329\u2013368 (2002)","journal-title":"TOCS"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11863908_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:22:40Z","timestamp":1559506960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11863908_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540446019","9783540446057"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/11863908_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}