{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T02:10:15Z","timestamp":1738289415592,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_38","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"589-603","source":"Crossref","is-referenced-by-count":1,"title":["Ubiquitous Privacy-Preserving Identity Managment"],"prefix":"10.1007","author":[{"given":"Kristof","family":"Verslype","sequence":"first","affiliation":[]},{"given":"Bart De","family":"Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Entrust authority roaming server. http:\/\/www.entrust.com\/pki\/roaming\/index.htm."},{"key":"38_CR2","unstructured":"Higgins trust framework project home. http:\/\/www.eclipse.org\/higgins\/."},{"key":"38_CR3","unstructured":"Introducing windows cardspace. http:\/\/msdn2.microsoft.com\/en-us\/library\/aa480189.aspx."},{"key":"38_CR4","unstructured":"Liberty allicance project. http:\/\/www.projectliberty.org\/."},{"key":"38_CR5","unstructured":"Verisign roaming. http:\/\/www.verisign.com\/products-services\/security-services\/pki\/pkisecurity\/ wireless-roaming\/index.html."},{"key":"38_CR6","unstructured":"J. Basney, W. Yurcik, R. Bonilla, and A. Slagell. The credential wallet: A classification of credential repositories highlighting myproxy. In Proceedings of the 31st Research Conference on Communication, Information and Internet Policy, 2003."},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Stefan A. Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge, MA, USA, 2000.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT \u201901: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pages 93\u2013118, London, UK, 2001. Springer-Verlag.","DOI":"10.1007\/3-540-44987-6_7"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Markus Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO \u201997: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 410\u2013424, London, UK, 1997. Springer-Verlag.","DOI":"10.1007\/BFb0052252"},{"issue":"10","key":"38_CR10","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"Chaum. David","year":"1985","unstructured":"David Chaum. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28(10):1030\u20131044, 1985.","journal-title":"Commun. ACM"},{"key":"38_CR11","unstructured":"Matt Hooks and Jadrian Miles. Onion routing and online anonymity. CS182S, 2006."},{"issue":"4","key":"38_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"K.Lenstra Arjen","year":"2001","unstructured":"Arjen K. Lenstra and Eric R. Verheul. Selecting cryptographic key sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14(4):255\u2013293, 2001.","journal-title":"Journal of Cryptology: the journal of the International Association for Cryptologic Research"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"J. Novotny, S. Tuecke, and V. Welch. An online credential repository for the grid: Myproxy. In Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10). IEEE Press, 2001.","DOI":"10.1109\/HPDC.2001.945181"},{"key":"38_CR14","unstructured":"G. Sarbari. Security characteristics of cryptographic mobility solutions. In Proceedings of the 1 Annual PKI Research Workshop, Gaithersburg, Maryland, 2002."},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In SP \u201997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 44, Washington, DC, USA, 1997. IEEE Computer Society.","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"David Del Vecchio, Marty Humphrey, Jim Basney, and Nataraj Nagaratnam. Credex: Usercentric credential management for grid and web services. In ICWS \u201905: Proceedings of the IEEE International Conference on Web Services (ICWS\u201905), pages 149\u2013156,Washington, DC, USA, 2005. IEEE Computer Society.","DOI":"10.1109\/ICWS.2005.43"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T01:31:36Z","timestamp":1738287096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_38","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}