{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:50Z","timestamp":1740099170657,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047610"},{"type":"electronic","value":"9783030047627"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04762-7_9","type":"book-chapter","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T05:13:48Z","timestamp":1542690828000},"page":"164-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,21]]},"reference":[{"key":"9_CR1","unstructured":"8x Nvidia GTX 1080 Hashcat Benchmarks. Accessed 09 July 2018"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbr\u00fccken, Germany, 21\u201324 March 2016, pp. 292\u2013302 (2016). \nhttps:\/\/doi.org\/10.1109\/EuroSP.2016.31","DOI":"10.1109\/EuroSP.2016.31"},{"key":"9_CR3","unstructured":"Black, P.E.: Skip List. Dictionary of Algorithms and Data Structures. [online], Pieterse, V., Black, P.E. (eds.) \nhttps:\/\/xlinux.nist.gov\/dads\/HTML\/skiplist.html\n\n. Accessed 17 Nov 2017"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Cooper, D., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. In: RFC 5280, pp. 1\u2013151 (2008). \nhttps:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Laurie, B., Langley, A., K\u00e4sper, E.: Certificate transparency. In: RFC 6962, pp. 1\u201327 (2013). \nhttps:\/\/doi.org\/10.17487\/RFC6962","DOI":"10.17487\/RFC6962"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-319-69084-1_31","volume-title":"Lecture Notes in Computer Science","author":"Peter Mell","year":"2017","unstructured":"Mell, P., Kelsey, J., Shook, J.M.: Cryptocurrency smart contracts for distributed consensus of public randomness. In: Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, 5\u20138 November 2017, pp. 410\u2013425 (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-69084-1_31"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Newman, C., Klyne, G.: Date and Time on the Internet: Timestamps. RFC 3339, July 2002. \nhttps:\/\/doi.org\/10.17487\/RFC3339\n\n. \nhttps:\/\/rfc-editor.org\/rfc\/rfc3339.txt","DOI":"10.17487\/RFC3339"},{"key":"9_CR8","unstructured":"NIST Randomness Beacon (2018). \nhttps:\/\/www.nist.gov\/programs-projects\/nist-randomness-beacon\n\n. Accessed 09 July 2018"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Percival, C., Josefsson, S.: The scrypt password-based key derivation function. In: RFC 7914, pp. 1\u201316 (2016). \nhttps:\/\/doi.org\/10.17487\/RFC7914","DOI":"10.17487\/RFC7914"},{"key":"9_CR10","unstructured":"Powerball. \nhttps:\/\/www.powerball.com\/games\/home\n\n. Accessed 19 Sep 2018"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/0022-0000(83)90042-9","volume":"27","author":"MO Rabin","year":"1983","unstructured":"Rabin, M.O.: Transaction protection by beacons. J. Comput. Syst. Sci. 27(2), 256\u2013267 (1983). \nhttps:\/\/doi.org\/10.1016\/0022-0000(83)90042-9","journal-title":"J. Comput. Syst. Sci."},{"key":"9_CR12","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock Puzzles and Timed-release Crypto. Technical report Cambridge, MA, USA (1996)"},{"key":"9_CR13","volume-title":"The Strategy of Conflict","author":"TC Schelling","year":"1960","unstructured":"Schelling, T.C.: The Strategy of Conflict. Oxford University Press, Oxford (1960)"},{"key":"9_CR14","unstructured":"National Institute of Standards and Technology. FIPS 180\u20134, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180\u20134. Technical report. Department of Commerce (2015). \nhttp:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf"},{"key":"9_CR15","unstructured":"National Institute of Standards and Technology. FIPS 186\u20134, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 186\u20134 Digital Signature Standard (DSS. Technical report Department of Commerce (2013). \nhttp:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf"},{"key":"9_CR16","unstructured":"Szabo, N.: Trusted Third Parties are Security Holes (2001). Accessed 09 July 2018"},{"key":"9_CR17","unstructured":"Wikipedia contributors. Dow Jones Industrial Average\u2014Wikipedia, The Free Encyclopedia (2018). \nhttps:\/\/en.wikipedia.org\/w\/index.php?title=Dow_Jones_Industrial_Average&oldid=860019957\n\n. Accessed 19 Sep 2018"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04762-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T05:17:02Z","timestamp":1542691022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04762-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047610","9783030047627"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04762-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssr2018.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}