{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:45:57Z","timestamp":1742395557132},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_2","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"17-24","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis and Improvement of the Global Key Recovery System"],"prefix":"10.1007","author":[{"given":"Yanjiang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/3-540-44750-4_18","volume-title":"Advances in Cryptology, Crypto\u2019 95","author":"Y. Frankel","year":"1995","unstructured":"Y. Frankel and M. Yung, Escrow Encryption System Visited: Attack, Analysis and Designs. Advances in Cryptology, Crypto\u2019 95, LNCS 0963, Springer-Verlag, pp. 222\u2013235, 1995."},{"key":"2_CR2","unstructured":"L. Harn, H. Y. Lin and G. Gong, A Global Key Recovery System, Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81\u201385, 1999."},{"key":"2_CR3","unstructured":"J. Kilian and T. Leighton, Failsafe Key Escrow, Technical Report 636, MIT Lab, for Computer Science, 1994."},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055727","volume-title":"Advances in Cryptology, Crypto\u2019 98","author":"J. Kilian","year":"1998","unstructured":"J. Kilian and E. Petrank, Identity Escrow, Advances in Cryptology, Crypto\u2019 98, LNCS 1462, 1998."},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/3-540-44750-4_16","volume-title":"Adances in Cryptology, Crypto\u2019 95","author":"A. K. Lenstra","year":"1995","unstructured":"A. K. Lenstra, P. Winkler, Y. Yacobi, A Key Escrow System with Warrant Bounds, Adances in Cryptology, Crypto\u2019 95, LNCS 963, pp. 197\u2013207, 1995"},{"key":"2_CR6","unstructured":"S. Micali, Fair Public-Key Cryptosystems, Technical Report 579, MIT Lab, for Computer Science, 1993."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"J. G. Nieto, K. Viswanathan, C. Boyd and E. Dawson, Key Recovery System for the Commerical Environment, Security and Privacy (ACISP\u2019 2000), Springer-Verlag, pp. 149\u2013162, 2000.","DOI":"10.1007\/10718964_13"},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-48970-3_4","volume-title":"Information Security and Privacy (ACISP\u2019 99)","author":"K. Viswanathan","year":"1999","unstructured":"K. Viswanathan, C. Boyd and E. Dawson, Publicly Verifiable Key Escrow with Limited Time Span, Information Security and Privacy (ACISP\u2019 99), LNCS 1587, Springer-Verlag, pp. 36\u201351, 1999."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:39:18Z","timestamp":1556415558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}