{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:32Z","timestamp":1725484352823},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_24","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"303-315","source":"Crossref","is-referenced-by-count":4,"title":["Maintaining the Validity of Digital Signatures in B2B Applications"],"prefix":"10.1007","author":[{"given":"Jianying","family":"Zhou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"C. Admas, P. Cain, D. Pinkas, and R. Zuccherato. \u201cInternet X.509 public key infrastructure time-stamp protocol (TSP)\u201d. RFC 3161, August, 2001.","DOI":"10.17487\/rfc3161"},{"key":"24_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology: Proceedings of Crypto\u201999","author":"M. Bellare","year":"1999","unstructured":"M. Bellare and S. Miner. \u201cA forward-secure digital signature scheme\u201d. Lecture Notes in Computer Science 1666, Advances in Cryptology: Proceedings of Crypto\u201999, pages 431\u2013438, Santa Barbara, California, August 1999."},{"key":"24_CR3","volume-title":"Secure electronic commerce-Building the infrastructure for digital signatures and encryption","author":"W. Ford","year":"1997","unstructured":"W. Ford and M. Baum. \u201cSecure electronic commerce-Building the infrastructure for digital signatures and encryption\u201d. New Jersey: Prentice Hall, 1997."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk, and D. Solo. \u201cInternet X.509 public key infrastructure certificate and CRLprofile\u201d. RFC 2459, January 1999.","DOI":"10.17487\/rfc2459"},{"key":"24_CR5","unstructured":"ISO\/IEC 13888-1. \u201cInformation technology-Security techniques-Non-repudiation-Part 1: General\u201d. ISO\/IEC, 1997."},{"key":"24_CR6","unstructured":"ISO\/IEC 13888-3. \u201cInformation technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques\u201d. ISO\/IEC, 1997."},{"key":"24_CR7","unstructured":"ISO\/IEC 9796. \u201cInformation technology \u2014 Security techniques-Digital signature scheme giving message recovery\u201d. ISO\/IEC, 1991."},{"key":"24_CR8","unstructured":"ITU-T. \u201cInformation technology-Open systems interconnection-The directory: Public-key and attribute certificate frameworks\u201d. ITU-T Recommendation X.509(V4), 2000."},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"H. Krawczyk. \u201cSimple forward-secure signatures from any signature scheme\u201d. Proceedings of 7th ACM Conference on Computer and Communications Security, pages 108\u2013115, Athens, Greece, November 2000.","DOI":"10.1145\/352600.352617"},{"key":"24_CR10","unstructured":"NIST FIPS PUB 186. \u201cDigital signature standard\u201d. National Institute of Standards and Technology, May 1994."},{"key":"24_CR11","volume-title":"Applied cryptography-Protocols, algorithms, and source code in","author":"B. Schneier","year":"1996","unstructured":"B. Schneier. \u201cApplied cryptography-Protocols, algorithms, and source code in \u201d. New York: John Wiley & Sons, 1996 (second edition).","edition":"second edition"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"J. Zhou and K. Y. Lam. \u201cSecuring digital signatures for non-repudiation\u201d. Computer Communications, 22(8):710\u2013716, Elsevier, May 1999.","DOI":"10.1016\/S0140-3664(99)00031-6"},{"issue":"2","key":"24_CR13","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/505680.505684","volume":"30","author":"J. Zhou","year":"2000","unstructured":"J. Zhou and R. H. Deng. \u201cOn the validity of digital signatures\u201d. Computer Communication Review, 30(2):29\u201334, ACM Press, April 2000.","journal-title":"Computer Communication Review"},{"key":"24_CR14","unstructured":"J. Zhou. \u201cNon-repudiation in electronic commerce\u201d. Computer Security Series, Artech House, August 2001."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:39:23Z","timestamp":1556415563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}