{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T04:56:25Z","timestamp":1744520185632,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540617709"},{"type":"electronic","value":"9783540706755"}],"license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61770-1_32","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:22:40Z","timestamp":1330294960000},"page":"131-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Server-Supported Signatures"],"prefix":"10.1007","author":[{"given":"N.","family":"Asokan","sequence":"first","affiliation":[]},{"given":"G.","family":"Tsudik","sequence":"additional","affiliation":[]},{"given":"M.","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"9_CR1","volume-title":"Computer Communications Security \u2014 Principles, Standard Protocols and Techniques","author":"W. Ford","year":"1994","unstructured":"Warwick Ford. Computer Communications Security \u2014 Principles, Standard Protocols and Techniques. Prentice Hall, New Jersey, 1994."},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3\/2","author":"S. Haber","year":"1991","unstructured":"Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology 3\/2 (1991) 99\u2013111.","journal-title":"Journal of Cryptology"},{"key":"9_CR3","unstructured":"ISO\/IEC JTC1, Information Technology, SC 27. 2nd ISO\/IEC CD 13888-1 Information Technology \u2014 Security Techniques \u2014 Non-repudiation \u2014 Part1: General Model. ISO\/IEC JTC 1\/SC 27 N 1105, May 1995."},{"key":"9_CR4","unstructured":"ISO\/IEC JTC1, Information Technology, SC 27. 2nd ISO\/IEC CD 13888-2 Information Technology \u2014 Security Techniques \u2014 Non-repudiation \u2014 Part2: Using symmetric encipherment algorithms. ISO\/IEC JTC 1\/SC 27 N 1106, July 1995."},{"key":"9_CR5","unstructured":"ISO\/IEC JTC1, Information Technology, SC 27. ISO\/IEC CD 13888-3 Information Technology \u2014 Security Techniques \u2014 Non-repudiation \u2014 Part3: Using asymmetric techniques. ISO\/IEC JTC 1\/SC 27 N 1107, September 1995."},{"key":"9_CR6","series-title":"number 293 in Lecture Notes in Computer Science","first-page":"369","volume-title":"Advances in Cryptology \u2014 CRYPTO '87","author":"R. C. Merkle","year":"1987","unstructured":"Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology \u2014 CRYPTO '87, number 293 in Lecture Notes in Computer Science, pages 369\u2013378, Santa Barbara, CA, USA, August 1987. Springer-Verlag, Berlin Germany."},{"key":"9_CR7","first-page":"125","volume-title":"Fail-stop signatures; principles and applications","author":"B. Pfitzmann","year":"1991","unstructured":"Birgit Pfitzmann. Fail-stop signatures; principles and applications. Proc. Compsec '91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125\u2013134."},{"key":"9_CR8","unstructured":"Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Practical signatures where individuals are unconditionally secure. Unpublished manuscript, available from the authors (pfitzb@informatik.unihildesheim.de), 1991."},{"key":"9_CR9","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition, 1996.","edition":"second edition"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 96"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61770-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T07:13:25Z","timestamp":1593760405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61770-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540617709","9783540706755"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-61770-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]},"assertion":[{"value":"2 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}