{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:01Z","timestamp":1737398401265,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_18","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"237-248","source":"Crossref","is-referenced-by-count":11,"title":["An Efficient Protocol for Certified Electronic Mail"],"prefix":"10.1007","author":[{"given":"Josep","family":"Llu\u00eds Ferrer-Gomila","sequence":"first","affiliation":[]},{"given":"Magdalena","family":"Payeras-Capell\u00e0","sequence":"additional","affiliation":[]},{"given":"Lloren\u00e7","family":"Huguet i Rotger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"N. Asokan, Matthias Schunter and Michael Waidner: \u201cOptimistic protocols for fair exchange\u201d; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7\u201317, Zurich, Switzerland, April 1997.","key":"18_CR1","DOI":"10.1145\/266420.266426"},{"doi-asserted-by":"crossref","unstructured":"N. Asokan, Victor Shoup and Michael Waidner: \u201cAsynchronous Protocols for Optimistic Fair Exchange\u201d; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86\u201399, Oakland, CA, May 1998.","key":"18_CR2","DOI":"10.1109\/SECPRI.1998.674826"},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M. Ben-Or","year":"1990","unstructured":"Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: \u201cA Fair Protocol for Signing Contracts\u201d; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40\u201346, January 1990.","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"F. Bao, Robert H. Deng and W. Mao: \u201cEfficient and practical fair exchange protocols with off-line TTP\u201d; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77\u201385, Oakland, CA, May 1998.","key":"18_CR4","DOI":"10.1109\/SECPRI.1998.674825"},{"unstructured":"Alireza Bahreman and J.D. Tygar: \u201cCertified Electronic Mail\u201d; Proceedings of Symposium on Network and Distributed Systems Security, Internet Society, San Diego, California, pages 3\u201319, February 1994.","key":"18_CR5"},{"doi-asserted-by":"crossref","unstructured":"David H. Crocker: \u201cStandard for the format of ARPA Internet text messages\u201d; Internet RFC-822, August 1982.","key":"18_CR6","DOI":"10.17487\/rfc0822"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/232335.232338","volume":"26","author":"T. Coffey","year":"1996","unstructured":"T. Coffey and P. Saidha: \u201cNon-repudiation with mandatory proof of receipt\u201d; Computer Communication Review, 26(1):6\u201317, January 1996.","journal-title":"Computer Communication Review"},{"unstructured":"Benjamin Cox, J.D. Tygar and Marvin Sirbu: \u201cNetBill security and transaction protocol\u201d; Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77\u201388, New York, July 1995.","key":"18_CR8"},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-48285-7_17","volume-title":"Practical and provably secure release of a secret and exchange of signatures","author":"I. Damgard Bjerre","year":"1994","unstructured":"Ivan Bjerre Damgard: \u201cPractical and provably secure release of a secret and exchange of signatures\u201d; Advances in Cryptology-Proceedings of Eurocrypt\u201993, LNCS 765, pages 200\u2013217, Springer Verlag, (Lofthus, Norway), May 1993."},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF02139147","volume":"4","author":"R. H. Deng","year":"1996","unstructured":"Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: \u201cPractical Protocols for Certified Electronic Mail\u201d; Journal of Network and Systems Management, Vol. 4, n\u00b0. 3, pages 279\u2013297, September 1996.","journal-title":"Journal of Network and Systems Management"},{"unstructured":"Josep L. Ferrer, Lloren\u00e7 Huguet and Maci\u00e0 Mut: \u201cProtocolo de Correo Electr\u00f6nico Certificado\u201d; Proceedings of V Reuni\u00f3n Espa\u00f1ola de Criptolog\u00eda, M\u00e1laga, 1998.","key":"18_CR11"},{"doi-asserted-by":"crossref","unstructured":"Matthew K. Franklin and Michael K. Reiter: \u201cFair exchange with a semi-trusted third party\u201d; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1\u20136, Zurich, Switzerland, April 1997.","key":"18_CR12","DOI":"10.1145\/266420.266424"},{"unstructured":"Josep L. Ferrer, \u00c1ngel Rotger and Lloren\u00e7 Huguet: \u201cFirma electr\u00f3nica de contratos\u201d; Proceedings of III Reuni\u00f3n Espa\u00f1ola de Criptolog\u00eda, Barcelona (Spain), 1994.","key":"18_CR13"},{"unstructured":"ISO\/IEC DIS 13888-1: \u201cInformation technology-Security techniques-Non-repudiation-Part 1: General model\u201d; ISO\/IEC JTC1\/SC27 N1503, October 1996.","key":"18_CR14"},{"unstructured":"ISO\/IEC DIS 13888-3: \u201cInformation technology-Security techniques-Non-repudiation-Part 3: Using asymmetric techniques\u201d; ISO\/IEC JTC1\/SC27 N1507, October 1996.","key":"18_CR15"},{"unstructured":"ISO\/IEC DIS 13888-2: \u201cInformation technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques\u201d; ISO\/IEC JTC1\/SC27 N1679, April 1997.","key":"18_CR16"},{"unstructured":"J.L. Ferrer and L. Huguet: \u201cAn Efficient Asynchronous Protocol for Optimistic Certified Electronic Mail\u201d; International Workshop on Cryptographic Techniques & E-commerce, Hong Kong, July 1999.","key":"18_CR17"},{"unstructured":"Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of applied cryptography; CRC Press, 1996.","key":"18_CR18"},{"doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta: \u201cHow to simultaneously exchange secrets by general assumptions\u201d; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14\u201328, Fairfax, Virginia, November 1994.","key":"18_CR19","DOI":"10.1145\/191177.191221"},{"doi-asserted-by":"crossref","unstructured":"Jonathan B. Postel: \u201cSimple mail transfer protocol\u201d; Internet RFC-821, August 1982.","key":"18_CR20","DOI":"10.17487\/rfc0821"},{"unstructured":"Charles P. Pfleeger: Security in Computing; Revised Edition, Prentice-Hall, 1997.","key":"18_CR21"},{"unstructured":"Maci\u00e0 Mut, Josep L. Ferrer and Lloren\u00e7 Huguet: \u201cCertified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties\u201d; Proceedings of IEEE Infocom 2000, Tel Aviv (Israel), March 2000.","key":"18_CR22"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman: \u201cA Method for Obtaining Digital Signatures and Public Key Cryptosystems\u201d; Communications of the ACM, 21, pages 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"unstructured":"ITU-T: \u201cRecommendation X.400: Message handling system and service overview\u201d; November 1988, revised July 1996.","key":"18_CR24"},{"doi-asserted-by":"crossref","unstructured":"Jianying Zhou and Dieter Gollmann: \u201cA Fair Non-repudiation Protocol\u201d; Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Oakland, California, pages 55\u201361, May 1996.","key":"18_CR25","DOI":"10.1109\/SECPRI.1996.502669"},{"key":"18_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-61770-1_35","volume-title":"Certified Electronic Mail","author":"J. Zhou","year":"1996","unstructured":"Jianying Zhou and Dieter Gollman: \u201cCertified Electronic Mail\u201d; Advances in Cryptology-Proceedings of ESORICS\u201996, LNCS-1146, pages 160\u2013171, 1996."},{"doi-asserted-by":"crossref","unstructured":"Jianying Zhou and Dieter Gollmann: \u201cAn Efficient Non-repudiation Protocol\u201d; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126\u2013132, Rockport, Massachusetts, IEEE Computer Society Press, June 1997.","key":"18_CR27","DOI":"10.1109\/CSFW.1997.596801"},{"key":"18_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/b103344","volume-title":"Some Remarks on a Fair Exchange Protocol","author":"J. Zhou","year":"2004","unstructured":"Jianying Zhou, Robert Deng and Feng Bao: \u201cSome Remarks on a Fair Exchange Protocol\u201d; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46\u201357, Melbourne, Victoria, Australia, January 2000."},{"doi-asserted-by":"crossref","unstructured":"Matthew Berry, Andrew Hutchison and Elton Saul: \u201cPredicting the performance of transactional electronic commerce protocols\u201d; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161\u2013175, Amsterdam, The Netherlands, September 30-October 1, 1999.","key":"18_CR29","DOI":"10.1007\/978-0-387-35575-7_13"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:08:15Z","timestamp":1737396495000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}