{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:21:20Z","timestamp":1737436880037,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_18","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:10:11Z","timestamp":1188313811000},"page":"241-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptosystems Robust against \u201cDynamic Faults\u201d Meet Enterprise Needs for Organizational \u201cChange Control\u201d"],"prefix":"10.1007","author":[{"given":"Yair","family":"Frankel","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"18_CR1","unstructured":"M. Blaze, J. Feigenbaum and J. Lacey, Decentralized Trust Management, IEEE Security and Privacy, 1996."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94, pp. 522\u2013533.","DOI":"10.1145\/195058.195405"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel, Shared Generation of Authenticators and Signatures Crypto 91, pp. 457\u2013469.","DOI":"10.1007\/3-540-46766-1_37"},{"key":"18_CR4","unstructured":"L. Downes and C. Mui, unleashing the Killer App: digital strategies for market dominance, Harvard Business School Press, 1998."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"C.M. Ellison, SPKI Certificate Document. 1998. (Document available also in URL http:\/\/ftp.clark.net\/pub\/cme\/html\/spki.html )","DOI":"10.17487\/rfc2693"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"B. Fox and B. LaMacchia, Certificate Revocation: Mechanisms and Meaning, Financial Cryptography 98, pp. 158\u2013164.","DOI":"10.1007\/BFb0055479"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Y. Frankel, A practical protocol for large group oriented networks, In J.J. Quisquater and J. Vandewalle, editor, Advances in Cryptology Proc. of Eurocrypt\u2019 89, pp. 56\u201361.","DOI":"10.1007\/3-540-46885-4_8"},{"key":"18_CR8","unstructured":"Y.Y. Frankel, P. Gemmel, P. MacKenzie and M. Yung Optimal Resilience Proactive Public Key Systems, FOCS 97."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Z. Galil, S. Haber and M. Yung, Cryptographic Computations: Secure Fault Tolerant Protocols in the Public Key Model, Crypto 87, pp. 135\u2013155.","DOI":"10.1007\/3-540-48184-2_10"},{"issue":"2","key":"18_CR10","first-page":"99","volume":"3","author":"S. Haber","year":"1991","unstructured":"S. Haber and W.S. Stornetta, How to Time-Stamp a Digital Document, Journal of Cryptography, v. 3 n. 2, 1991, Springer International, pp. 99\u2013112.","journal-title":"Journal of Cryptography"},{"key":"18_CR11","unstructured":"A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive Public-Key and Signature Schemes, ACM CCS 97."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"R.J. Hayton, J.M. Bacon and K. Moody, Access Control in an Open Distributed Environment, IEEE Security and Privacy, 98, pp. 3\u201314.","DOI":"10.1109\/SECPRI.1998.674819"},{"key":"18_CR13","unstructured":"B. Lampson, Protection, 5-th Princeton Symp. on Information Sciences 71, (Published 74 in ACM\u2019s Operating Systems Review)"},{"key":"18_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BFb0054017","volume-title":"Certifying Trust","author":"H. Lehti","year":"1998","unstructured":"H. Lehti and P. Nikander, Certifying Trust, PKC 98, LNCS Springer 1431, pp. 83\u201398."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and M. Yung, How to withstand mobile virus attacks, Proc. of the 10th ACM Symposium on the Principles of Distributed Computing, 1991, pp. 51\u201361.","DOI":"10.1145\/112600.112605"},{"key":"18_CR16","unstructured":"R. Rivest and B. Lampson, SDSI-A simple distributed security infrastructure, (See also, http:\/\/theory.lcs.mit.edu\/ cis\/sdsi.html )"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:13:34Z","timestamp":1737396814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}