{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:07Z","timestamp":1725888607705},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_24","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"398-405","source":"Crossref","is-referenced-by-count":3,"title":["Redactable Graph Hashing, Revisited"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Erwig","sequence":"first","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Hald","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Helm","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kiel","sequence":"additional","affiliation":[]},{"given":"Florian","family":"K\u00fcbler","sequence":"additional","affiliation":[]},{"given":"Michael","family":"K\u00fcmmerlin","sequence":"additional","affiliation":[]},{"given":"Jakob","family":"Laenge","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Rohrbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Arshad, M.U., Kundu, A., Bertino, E., Madhavan, K., Ghafoor, A.: Security of graph data: hashing schemes and definitions. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014, NY, USA, pp. 223\u2013234 (2014). \nhttp:\/\/doi.acm.org\/10.1145\/2557547.2557564","DOI":"10.1145\/2557547.2557564"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G Ateniese","year":"2005","unstructured":"Ateniese, G., Chou, D.H., Medeiros, B., Tsudik, G.: Sanitizable signatures. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159\u2013177. Springer, Heidelberg (2005). doi:\n10.1007\/11555827_10"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bauer, D., Blough, D.M., Mohan, A.: Redactable signatures on data with dependencies and their application to personal health records. In: Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, WPES 2009, Chicago, Illinois, USA, November 9, 2009, pp. 91\u2013100. ACM (2009)","DOI":"10.1145\/1655188.1655201"},{"key":"24_CR4","unstructured":"Brown, J., Ahamad, M., Ahmed, M., Blough, D.M., Kurc, T., Post, A., Saltz, J.: Redactable and auditable data access for bioinformatics research, pp. 21\u201325 (2013)"},{"key":"24_CR5","unstructured":"Brown, J., Blough, D.M.: Verifiable and redactable medical documents. In: American Medical Informatics Association Annual Symposium AMIA 2012, Chicago, Illinois, USA, November 3\u20137, 2012. AMIA (2012)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-00468-1_18","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"C Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schr\u00f6der, D., Volk, F.: Security of sanitizable signatures revisited. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 317\u2013336. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-00468-1_18"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-13013-7_26","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"C Brzuska","year":"2010","unstructured":"Brzuska, C., Fischlin, M., Lehmann, A., Schr\u00f6der, D.: Unlinkability of sanitizable signatures. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 444\u2013461. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-13013-7_26"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Gertz, M., Kwong, A., Martel, C.U., Nuckolls, G., Stubblebine, S.G.: Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, CCS 2001, Philadelphia, Pennsylvania, USA, November 6\u20138, 2001, pp. 136\u2013145. ACM (2001)","DOI":"10.1145\/501983.502003"},{"key":"24_CR9","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/0-306-47008-X_9","volume-title":"Data and Application Security","author":"P Devanbu","year":"2002","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: Thuraisingham, B., Riet, R., Dittrich, K.R., Tari, Z. (eds.) DBSec 2000. IIFIP, vol. 73, pp. 101\u2013112. Springer, Boston, MA (2002). doi:\n10.1007\/0-306-47008-X_9"},{"issue":"3","key":"24_CR10","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"PT Devanbu","year":"2003","unstructured":"Devanbu, P.T., Gertz, M., Martel, C.U., Stubblebine, S.G.: Authentic data publication over the internet. J. Comput. Secur. 11(3), 291\u2013314 (2003)","journal-title":"J. Comput. Secur."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM Press, Bethesda, 31 May\u20132 Jun 2009","DOI":"10.1145\/1536414.1536440"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002). doi:\n10.1007\/3-540-45760-7_17"},{"issue":"1","key":"24_CR13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s00453-003-1076-8","volume":"39","author":"CU Martel","year":"2004","unstructured":"Martel, C.U., Nuckolls, G., Devanbu, P.T., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39(1), 21\u201341 (2004)","journal-title":"Algorithmica"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology \u2014 ICISC 2001","author":"R Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 285\u2013304. Springer, Heidelberg (2002). doi:\n10.1007\/3-540-45861-1_22"},{"issue":"3","key":"24_CR15","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s10916-010-9639-0","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Hsueh, C., Tsai, C., Lai, F., Lee, H., Chung, Y.: Redactable signatures for signed CDA documents. J. Med. Syst. 36(3), 1795\u20131808 (2012)","journal-title":"J. Med. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:22:28Z","timestamp":1496096548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}