{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:30Z","timestamp":1725496650384},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_20","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"274-283","source":"Crossref","is-referenced-by-count":6,"title":["A Modular Approach to Key Distribution"],"prefix":"10.1007","author":[{"given":"Walter","family":"Fumy","sequence":"first","affiliation":[]},{"given":"Michael","family":"Munzert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"ANSI X9.17-1985: Financial Institution Key Management (Wholesale), 1985.","key":"20_CR1"},{"unstructured":"ANSI X12.42-198x: EDI Security Structures and Cryptographic Service Message Transaction Set, 1989.","key":"20_CR2"},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/3-540-46885-4_6","volume-title":"Proceedings of Eurocrypt\u201989","author":"F. Bauspie\u00df","year":"1990","unstructured":"Bauspie\u00df, F.; Knobloch, H.-J.: \u201cHow to Keep Authenticity Alive in a Computer Network\u201d, Proceedings of Eurocrypt\u201989, Springer LNCS 434 (1990), 38\u201346."},{"doi-asserted-by":"crossref","unstructured":"Burrows, M.; Abadi, M.; Needham, R.: A Logic of Authentication, DEC System Research Center Report 39, 1990.","key":"20_CR4","DOI":"10.1145\/74850.74852"},{"unstructured":"CCITT Draft Recommendation X.509: The Directory-Authentication Framework, 1987.","key":"20_CR5"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W.; Hellman, M.E.: \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, 22 (1976), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Proceedings of Eurocrypt\u201989","author":"Ch.G. G\u00fcnther","year":"1990","unstructured":"G\u00fcnther, Ch.G.: \u201cAn Identity-Based Key-Exchange Protocol\u201d, Proceedings of Eurocrypt\u201989, Springer LNCS 434 (1990), 29\u201337."},{"unstructured":"ISO 7498-2: Open Systems Interconnections-Part 2: Security Architecture, 1988.","key":"20_CR8"},{"unstructured":"IEC\/ISO 9797: Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm, 1989.","key":"20_CR9"},{"unstructured":"IEC\/ISO Committee Draft 9798-2: Entity Authentication Mechanisms-Part 2: Entity Authentication Using Symmetric Techniques, 1990.","key":"20_CR10"},{"unstructured":"IEC\/ISO Committee Draft 9798-3: Entity Authentication Mechanisms-Part 3: Entity Authentication Using a Public-Key Algorithm, 1990.","key":"20_CR11"},{"unstructured":"IEC\/ISO\/JTC1\/SC27\/WG2 Working Draft: Key Management Part 2: Key Management Using Symmetric Cryptographic Techniques, 1990.","key":"20_CR12"},{"unstructured":"IEC\/ISO\/JTC1\/SC27\/WG2 Working Draft: Key Management Part 3: Key Management Using Public Key Techniques, 1990.","key":"20_CR13"},{"key":"20_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-48184-2_13","volume-title":"Proceedings of Crypto\u201987","author":"K. Koyama","year":"1988","unstructured":"Koyama K.; Ohta, K.: \u201cIdentity-Based Conference Key Distribution Systems\u201d, Proceedings of Crypto\u201987, Springer LNCS 293 (1988), 175\u2013184."},{"unstructured":"Miller, S.P.; Neuman, C.; Schiller, J.I.; Saltzer, J.H.: Kerberos Authentication and Authorization System, Project Athena Technical Plan, MIT, 1987.","key":"20_CR15"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M.; Schroeder, M.D.: \u201cUsing Encryption for Authentication in Large Networks of Computers\u201d, Communications of the ACM, 21 (1978), 993\u2013999.","journal-title":"Communications of the ACM"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1049\/el:19860880","volume":"22","author":"E. Okamoto","year":"1986","unstructured":"Okamoto, E.: \u201cProposal for Identity-Based Key Distribution Systems\u201d, Electronic Letters, 22 (1986), 1283\u20131284.","journal-title":"Electronic Letters"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/24592.24594","volume":"21","author":"D. Otway","year":"1987","unstructured":"Otway, D.; Rees, O.: \u201cEfficient and Timely Mutual Authentication\u201d, Operating Systems Review, 21 (1987), 8\u201310.","journal-title":"Operating Systems Review"},{"key":"20_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/3-540-45961-8_1","volume-title":"Proceedings of Eurocrypt\u201988","author":"R.A. Rueppel","year":"1988","unstructured":"Rueppel, R.A.: \u201cKey Agreements Based on Function Composition\u201d, Proceedings of Eurocrypt\u201988, Springer LNCS 330 (1988), 3\u201310."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:09Z","timestamp":1619572809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_20","relation":{},"subject":[]}}