{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:17:47Z","timestamp":1725495467735},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430100"},{"type":"electronic","value":"9783540453116"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45311-3_14","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T19:01:41Z","timestamp":1195066901000},"page":"136-148","source":"Crossref","is-referenced-by-count":16,"title":["Selective Receipt in Certified E-mail"],"prefix":"10.1007","author":[{"given":"Steve","family":"Kremer","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,26]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In T. Matsumoto, editor, 4th ACM Conference on Computer and Communications Security, pages 8\u201317, Zurich, Switzerland, Apr. 1997. ACM Press.","DOI":"10.1145\/266420.266426"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86\u201399, Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"14_CR3","unstructured":"G. Ateniese, B. de Medeiros, and M. T. Goodrich. TRICERT: A distributed certified E-mail scheme. In Symposium on Network and Distributed Systems Security (NDSS 2001), San Diego, CA, Feb. 2001. Internet Society."},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M. Ben-Or","year":"1990","unstructured":"M. Ben-Or, O. Goldreich, S. Micali, and R. L. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, 36(1):40\u201346, 1990.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"O. Berthold, H. Federrath, and M. K\u00f6hntopp. Anonymity and unobservability in the internet. In Workshop on Freedom and Privacy by Design, Toronto, Canada, Apr. 2000.","DOI":"10.1145\/332186.332211"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84\u201388, Feb. 1981.","journal-title":"Communications of the ACM"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"R. H. Deng, L. Gong, A. A. Lazar, and W. Wang. Practical protocols for certified electronic mail. Journal of Network and System Management, 4(3), 1996.","DOI":"10.1007\/BF02139147"},{"key":"14_CR8","unstructured":"S. Kremer and O. Markowitch. Optimistic non-repudiable information exchange. In J. Biemond, editor, 21st Symp. on Information Theory in the Benelux, pages 139\u2013146, Wassenaar (NL), May25\u201326 2000. Werkgemeenschap Informatie-en Communicatietheorie, Enschede (NL)."},{"key":"14_CR9","unstructured":"O. Markowitch and Y. Roggeman. Probabilistic non-repudiation without trusted third party. In Second Conference on Security in Communication Networks\u201999, Amalfi, Italy, Sept. 1999."},{"key":"14_CR10","unstructured":"J. Riordan and B. Schneier. A certified E-mail protocol. In 14th Annual Computer Security Applications Conference. ACM, 1998."},{"key":"14_CR11","unstructured":"M. Schunter. Optimistic Fair Exchange. PhD thesis, Technische Fakult\u00e4t der Universit\u00e4t des Saarlandes, Saarbr\u00fccken, 2000."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, May 4\u20137, 1997, Oakland, California, pages 44\u201354. IEEE Computer Society Press, 1997.","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"14_CR13","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/3-540-39568-7_34","volume-title":"Advances in Cryptology: Proceedings of Crypto\u201984","author":"T. Tedrick","year":"1985","unstructured":"T. Tedrick. Fair exchange of secrets. In G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology: Proceedings of Crypto\u201984, volume 196 of Lecture Notes in Computer Science, pages 434\u2013438. Springer-Verlag, 1985."},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/3-540-48970-3_21","volume-title":"Evolution of fair non-repudiation with TTP","author":"J. Zhou","year":"1999","unstructured":"J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In ACISP: Information Security and Privacy: Australasian Conference, volume 1587 of Lecture Notes in Computer Science, pages 258\u2013269, 1999."},{"key":"14_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-61770-1_35","volume-title":"Certified electronic mail","author":"J. Zhou","year":"1996","unstructured":"J. Zhou and D. Gollmann. Certified electronic mail. In Proc. ESORICS\u2019 96, volume 1146 of Lecture Notes in Computer Science, pages 160\u2013171, 1996."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"J. Zhou and D. Gollmann. An efficient non-repudiation protocol. In PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, 1997.","DOI":"10.1109\/CSFW.1997.596801"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45311-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T12:18:15Z","timestamp":1556972295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45311-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430100","9783540453116"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45311-3_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}