{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:57:49Z","timestamp":1743051469141,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587987"},{"type":"electronic","value":"9783030587994"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58799-4_49","type":"book-chapter","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T13:06:26Z","timestamp":1601471186000},"page":"676-691","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Signature in the XAdES Standard as a REST Service"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4595-7407","authenticated-orcid":false,"given":"Renato Carauta","family":"Ribeiro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2159-339X","authenticated-orcid":false,"given":"Edna Dias","family":"Canedo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"key":"49_CR1","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of information security. In: Cengage Learning (2011)"},{"key":"49_CR2","unstructured":"Regulation, G.D.P.: Eu data protection rules. In: European Commission (2018). https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en. Accessed 9 Oct 2019"},{"key":"49_CR3","unstructured":"da Rep\u00fablica, P.: Lei geral de prote\u00e7\u00e3o de dados pessoais (LGPD). In: Secretaria-Geral (2018). http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.html. Accessed 9 Oct 2019"},{"key":"49_CR4","volume-title":"Network and Internetwork Security: Principles and Practice","author":"W Stallings","year":"1995","unstructured":"Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)"},{"key":"49_CR5","first-page":"2","volume":"21","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: A method for obtaining digital signature and public-key cryptosystems. Communi. ACM 21, 2 (1987)","journal-title":"Communi. ACM"},{"key":"49_CR6","unstructured":"Tycksen Jr., F.A., Jennings, C.W.: Digital certificate, uS Patent 6,189,097, February 2001"},{"key":"49_CR7","unstructured":"da Educa\u00e7\u00f1o, M.: Diploma digital, Minist\u00e9rio da Educa\u00e7\u00f1o (2020). http:\/\/portal.mec.gov.br\/diplomadigital\/. Accessed 12 Feb 2020"},{"key":"49_CR8","doi-asserted-by":"publisher","unstructured":"Middelkamp, A.: Online. Praktische Huisartsgeneeskunde 3(4), 3 (2017). https:\/\/doi.org\/10.1007\/s41045-017-0040-y","DOI":"10.1007\/s41045-017-0040-y"},{"key":"49_CR9","volume-title":"Introduction to Data Communications and Networking","author":"B Forouzan","year":"1997","unstructured":"Forouzan, B., Coombs, C., Fegan, S.C.: Introduction to Data Communications and Networking. McGraw-Hill Inc., New York (1997)"},{"key":"49_CR10","unstructured":"Narendra, S.G., Tadepalli, P., Spitzer, T.N.: Symmetric cryptography with user authentication, uS Patent 8,477,940, 2 July 2013"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: Using genetic algorithm to break a mono - alphabetic substitution cipher. In: 2010 IEEE Conference on Open Systems (ICOS 2010), pp. 63\u201367, December 2010","DOI":"10.1109\/ICOS.2010.5720065"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Kurniawan, D.H., Munir, R.: Double chaining algorithm: a secure symmetric-key encryption algorithm. In: 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), pp. 1\u20136, August 2016","DOI":"10.1109\/ICAICTA.2016.7803097"},{"key":"49_CR13","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings 38th Annual Symposium on Foundations of Computer Science, pp. 394\u2013403. IEEE (1997)"},{"key":"49_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the power of GPUs for asymmetric cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 79\u201399. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_6"},{"key":"49_CR15","volume-title":"Cryptography & Network Security","author":"BA Forouzan","year":"2007","unstructured":"Forouzan, B.A.: Cryptography & Network Security. McGraw-Hill Inc., New York (2007)"},{"issue":"2","key":"49_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I Fundam. Theor. Appl. 48(2), 163\u2013169 (2001)","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theor. Appl."},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Chunguang, H., Hai, C., Yu, S., Qun, D.: Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: 2015 Third International Conference on Robot, Vision and Signal Processing (RVSP), pp. 163\u2013166, November 2015","DOI":"10.1109\/RVSP.2015.46"},{"issue":"2","key":"49_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"49_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 1996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399\u2013416. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_34"},{"key":"49_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-46035-7_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"J-S Coron","year":"2002","unstructured":"Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272\u2013287. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_18"},{"key":"49_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"issue":"11","key":"49_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"49_CR23","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar, M., Iqbal, A., Kumar, P.: A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process. 125, 187\u2013202 (2016). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165168416000347","journal-title":"Signal Process."},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Perin, G., Mesquita, D.G., Herrmann, F.L., Martins, J.B.: Montgomery modular multiplication on reconfigurable hardware: fully systolic array vs parallel implementation. In: 2010 VI Southern Programmable Logic Conference (SPL), pp. 61\u201366, March 2010","DOI":"10.1109\/SPL.2010.5483003"},{"key":"49_CR25","unstructured":"Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., Schwenk, J.: Security analysis of XAdES validation in the CEF digital signature services (DSS). In: Rossnagel, H.D., Wagner, S. (eds.)Gesellschaft fur Informatik (GI), vol. P-293, pp. 95\u2013106, cited By 0 (2019)"},{"key":"49_CR26","unstructured":"da Educa\u00e7\u00f1o, M.: Portaria n 330, de 5 de ABRIL de 2010. In: Minist\u00e9rioda Educa\u00e7\u00f1 (2018). http:\/\/www.in.gov.br\/materia\/-\/asset publisher\/Kujrw0TZC2Mb\/content\/id\/9365055\/do1-2018-04-06-portarian-330-de-5-de-abril-de-2018-9365051. Accessed 15 Feb 2020"},{"key":"49_CR27","unstructured":"da Educa\u00e7\u00e3o, M.: Portaria n 554, de 11 de mar\u00e7o de 2019. In: Minist\u00e9rio da Educa\u00e7\u00e3 (2019). http:\/\/www.in.gov.br\/materia\/-\/asset publisher\/Kujrw0TZC2Mb\/content\/id\/66544171\/do1-2019-03-12-portarian-554-de-11-de-marco-de-2019-66543842. Accessed 20 Feb 2020"},{"key":"49_CR28","unstructured":"da Educa\u00e7\u00e3o, M.: Portaria n 1095, DE 25 DE OUTUBRO DE 2018. In: Minist\u00e9rio daEduca\u00e7\u00e3 (2018). https:\/\/abmes.org.br\/arquivos\/legislacoes\/Port-MEC-1095-2018-10-25.pdf. Accessed 22 Feb 2020"},{"key":"49_CR29","doi-asserted-by":"crossref","unstructured":"Agilar, E., Almeida, R., Canedo, E.: A systematic mapping study on legacy system modernization. In: SEKE. KSI Research Inc. and Knowledge Systems Institute Graduate School, pp. 345\u2013350 (2016)","DOI":"10.18293\/SEKE2016-059"},{"key":"49_CR30","unstructured":"Agilar, E.D.V.: Uma abordagem orientada a servi\u00e7os para a moderniza\u00e7\u00e3o de sistemas legados, Universidade de Bras\u00eclia (UnB) (2016)"},{"key":"49_CR31","unstructured":"Angular.io: Agnular fundamentals Angular.io (2020). https:\/\/angular.io\/guide\/architecture. Accessed 01 Mar 2020"},{"key":"49_CR32","unstructured":"Erlang\/OTP: Erlang getting started with erlang user\u2019s guide Erlang OTP (2019). https:\/\/erlang.org\/doc\/getting_started\/conc_prog.html, Accessed 03 Mar 2020"},{"key":"49_CR33","unstructured":"Ribeiro, A.D.S.: Uma implementa\u00e7\u00e3o do protocolo oauth 2 em erlang para uma arquitetura orientada a servi\u00e7o, Universidade de Bras\u00eclia (UnB) (2017)"},{"issue":"2","key":"49_CR34","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","volume":"84","author":"N Van Eck","year":"2009","unstructured":"Van Eck, N., Waltman, L.: Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2), 523\u2013538 (2009)","journal-title":"Scientometrics"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58799-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T16:21:22Z","timestamp":1619194882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58799-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587987","9783030587994"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58799-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}