{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:51:38Z","timestamp":1725475898994},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482697"},{"type":"electronic","value":"9783540482727"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915034_77","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T23:40:30Z","timestamp":1164843630000},"page":"537-545","source":"Crossref","is-referenced-by-count":1,"title":["Disaster Coverable PKI Model Utilizing the Existing PKI Structure"],"prefix":"10.1007","author":[{"given":"Bo Man","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kyu Young","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"77_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44448-3_10","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Abdalla","year":"2000","unstructured":"Abdalla, M., Reyzin, L.: A New Forward-Secure Digital Signature Scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 116\u2013129. Springer, Heidelberg (2000)"},{"key":"77_CR2","volume-title":"Fourth Annual Conference on Computer and Communications Security","author":"R. Anderson","year":"1997","unstructured":"Anderson, R.: Invited lecture. In: Fourth Annual Conference on Computer and Communications Security, ACM Press, New York (1997)"},{"key":"77_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Sara, K., Miner, A.: Forward-Secure Digital Signature Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 431\u2013448. Springer, Heidelberg (1999)"},{"key":"77_CR4","unstructured":"Koga, S., Sakuarai, K.: Decentralization Methods of Certification Authority Using the Digital Signature Schemes. In: 2nd Annual PKI Research Workshop-Pre-proceedings (2003)"},{"key":"77_CR5","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Simple Forward-Secure Signature\u2019s From Any Signature Scheme. In: 7th ACN Conference on Computer and Communications Security (2000)","DOI":"10.1145\/352600.352617"},{"key":"77_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-540-30144-8_24","volume-title":"Information Security","author":"Z. Le","year":"2004","unstructured":"Le, Z., Ouyang, Y., Ford, J., Makedon, F.: A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 280\u2013291. Springer, Heidelberg (2004)"},{"key":"77_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"T. Malkin","year":"2002","unstructured":"Malkin, T., Micciancio, D., Miner, S.: Efficient Generic Forward-Secure Signatures With An Unbounded Number Of Time Periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, Springer, Heidelberg (2002)"},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Tzvetkov, V.: Disaster coverable PKI model based on Majority Trust principle. In: Proceedings of the international Conference on Information Technology: Coding and Computing (2004)","DOI":"10.1109\/ITCC.2004.1286601"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915034_77.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:41:13Z","timestamp":1619509273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915034_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482697","9783540482727"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11915034_77","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}