{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:22Z","timestamp":1725488662289},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540668008"},{"type":"electronic","value":"9783540467014"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-46701-7_9","type":"book-chapter","created":{"date-parts":[[2007,8,10]],"date-time":"2007-08-10T10:47:51Z","timestamp":1186742871000},"page":"109-118","source":"Crossref","is-referenced-by-count":0,"title":["Cert\u2019eM: Certification System Based on Electronic Mail Service Structure"],"prefix":"10.1007","author":[{"given":"Javier","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Mana","sequence":"additional","affiliation":[]},{"given":"Juan J.","family":"Ortega","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"9_CR1","unstructured":"U.K. Department of Trade and Industry, \u201cBuilding Confidence in Electronic Commerce-A Consultation Document\u201d, March 1999."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"J. Kohl, \u201cThe Use of Encryption in Kerberos for Network Authentication\u201d, Advances in Cryptology, Proceedings of CRYPTO\u2019 89, Springer-Verlag, 1989, pp. 35\u201343.","DOI":"10.1007\/0-387-34805-0_5"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"J. Kohl, B. Neuman, \u201cThe Kerberos Network Authentication Service (V5)\u201d, RFC 1510, 1993. http:\/\/www.ietf.org\/rfc\/rfc1510.txt","DOI":"10.17487\/rfc1510"},{"key":"9_CR4","unstructured":"D. Davis, \u201cKerberos Plus RSA for World Wide Web Security\u201d, First USENIX Workshop on Electronic Commerce, 1995, pp. 185\u2013188."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"R. Ganesan, \u201cYaksha: Augmenting Kerberos with Public Key Cryptography\u201d, Internet Society Symposium on Network and Distributed Systems Security, IEEE Press, 1995, pp. 132\u2013143.","DOI":"10.1109\/NDSS.1995.390639"},{"key":"9_CR6","unstructured":"J. Schiller, D. Atkins, \u201cScaling the Web of Trust: Combining Kerberos and PGP to Provide Large Scale Authentication\u201d, USENIX Technical Conference, 1995."},{"issue":"n. 6","key":"9_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman, \u201cNew Directions in Cryptography\u201d. IEEE Transactions on Information Theory, IT-22, n. 6. 1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR8","unstructured":"International Telecommunication Union, Itu-t Recommendation X.509. Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, 1997."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"C. Ellison, \u201cSPKI Requirements\u201d, Internet draft, May 1999. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-spki-cert-req-03.txt","DOI":"10.17487\/rfc2692"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"C. Ellison, W. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, \u201cSPKI Certificate Theory\u201d, Internet draft, June 1999. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-spki-cert-theory-05.txt","DOI":"10.17487\/rfc2693"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"D. Eastlake, \u201cDomain Name System Security Extensions\u201d, RFC 2535, March 1999. http:\/\/www.ietf.org\/rfc\/rfc2535.txt","DOI":"10.17487\/rfc2535"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"D. Eastlake, O. Gudmundsson, \u201cStoring Certificates in the Domain Name System (DNS)\u201d, RFC 2538, March 1999. http:\/\/www.ietf.org\/rfc\/rfc2538.txt","DOI":"10.17487\/rfc2538"},{"key":"9_CR13","unstructured":"European Commission, \u201cProposal for a European Parliament and Council Directive on a Common Framework for Electronic Signatures\u201d, COM(1998) 297 final, 1998. http:\/\/www.ispo.cec.be\/eif\/policy\/com98297.html"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cCan we Eliminate Revocation Lists?\u201d, Proceedings of the Second International Conference on Financial Cryptography, FC\u2019 98, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055482"},{"key":"9_CR15","unstructured":"C. Adams, M. Myers, A. Malpani, R. Ankney, S. Galperin, \u201cX.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP\u201d, Internet draft, April 1999. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-pkix-ocsp-08.txt"},{"key":"9_CR16","unstructured":"B. Wright, \u201cMaking Numbers Ceremonial: Signing Tax Returns with Personal Identification Numbers\u201d, personal communication, 1998."}],"container-title":["Lecture Notes in Computer Science","Secure Networking \u2014 CQRE [Secure] \u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46701-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T22:13:41Z","timestamp":1556748821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46701-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540668008","9783540467014"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46701-7_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}