{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:27:32Z","timestamp":1725470852985},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457763"},{"type":"electronic","value":"9783540462330"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876601_28","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T14:46:45Z","timestamp":1159282005000},"page":"273-282","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks"],"prefix":"10.1007","author":[{"given":"Chul","family":"Sur","sequence":"first","affiliation":[]},{"given":"Kyung Hyune","family":"Rhee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Baykal, N.: Server assisted signature revisited. In: Topics in Cryptology - CT-RSA 2003, pp. 143\u2013156 (March 2003)","DOI":"10.1007\/978-3-540-24660-2_12"},{"key":"28_CR2","unstructured":"Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: 2002 Network and Distributed Systems Security Symposium (NDSS 2002) (February 2002)"},{"key":"28_CR3","unstructured":"Gehrmann, C., Nyberg, K., Mitchell, C.: The personal CA - PKI for a Personal Area Network. In: Proceedings - IST Mobile & Wireless Communications Summit 2002 (June 2002)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 public key infrastructure certificate and CRL profile, RFC 2459 (January 1999)","DOI":"10.17487\/rfc2459"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Leighton, F., Micali, S., Szydlo, M.: Fractal Merkel tree representation and traversal. In: Topics in Cryptology - CT-RSA 2003, pp. 314\u2013326 (2003)","DOI":"10.1007\/3-540-36563-X_21"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11) (1981)","DOI":"10.1145\/358790.358797"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"R.C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signatures based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"28_CR9","unstructured":"Naor, D., Shenhav, A., Wool, A.: One-Time Signature Revisited: Have They Become Practical?, Cryptology ePrint Archive, Report 2005\/442 (2005)"},{"key":"28_CR10","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: The 7th USENIX Security Symposium (January 1998)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet public key infrastructure on-line certificate status protocol (OCSP), RFC 2560 (June 1999)","DOI":"10.17487\/rfc2560"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013194. Springer, Heidelberg (2000)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-39927-8_9","volume-title":"Information and Communications Security","author":"J. Zhou","year":"2003","unstructured":"Zhou, J., Fao, F., Deng, R.: An Efficient Public-Key Framework. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 88\u201399. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Management of Convergence Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876601_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:53Z","timestamp":1605642533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876601_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457763","9783540462330"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11876601_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}