{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:15:28Z","timestamp":1753884928971},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_22","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"260-266","source":"Crossref","is-referenced-by-count":2,"title":["Untransferable Rights in a Client-Independent Server Environment"],"prefix":"10.1007","author":[{"given":"Josep","family":"Domingo-Ferrer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Chaum, D., Evertse, J.-H., and Van de Graaf, J. 1988. An Improved Procotol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. Proceedings of Eurocrypt\u201987, Springer-Verlag, pp. 127\u2013141."},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0020-0190(91)90116-Y","volume":"40","author":"J. Domingo-Ferrer","year":"1991","unstructured":"Domingo-Ferrer, J. 1991. Distributed User Identification by Zero-Knowledge Access Rights Proving. Information Processing Letters, vol. 40, pp. 235\u2013239.","journal-title":"Information Processing Letters"},{"key":"22_CR3","unstructured":"Graham, G. S., and Denning, P. J. 1972. Protection: Principles and Practices. Proceedings of the AFIPS Spring Joint Computer Conference, pp. 417\u2013429."},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. A. Harrison","year":"1976","unstructured":"Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. 1976. Protection in Operating Systems. Communications of the ACM, vol. 19, pp. 461\u2013471.","journal-title":"Communications of the ACM"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Linn, J. 1990. Practical Authentication for Distributed Computing. Proc. IEEE Symposium on Research in Security and Privacy, IEEE CS Press, pp. 31\u201340.","DOI":"10.1109\/RISP.1990.63836"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, vol. 21, pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"22_CR7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/2.108052","volume":"25","author":"T. Y. C. Woo","year":"1992","unstructured":"Woo, T. Y. C, and Lam, S. S. 1992. Authentication for Distributed Systems. IEEE Computer, vol. 25, pp. 39\u201352.","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:26Z","timestamp":1619571026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_22","relation":{},"subject":[]}}