{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:28Z","timestamp":1725560908361},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_31","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"410-424","source":"Crossref","is-referenced-by-count":0,"title":["E-MHT. An Efficient Protocol for Certificate Status Checking"],"prefix":"10.1007","author":[{"given":"Jose L.","family":"Mu\u00f1oz","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Forn\u00e9","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Esparza","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Soriano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C., Farrell, S.: Internet X.509 Public Key Infrastructure Certificate Management Protocols, RFC 2510 (1999)","DOI":"10.17487\/rfc2510"},{"issue":"3","key":"31_CR2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3233\/JCS-2002-10304","volume":"10","author":"A. Buldas","year":"2002","unstructured":"Buldas, A., Laud, P., Lipmaa, H.: Eliminating counterevidence with applications to accountable certificate management. Journal of Computer Security\u00a010(3), 273\u2013296 (2002)","journal-title":"Journal of Computer Security"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S. Even","year":"1996","unstructured":"Even, S., Goldreich, O., Micali, S.: Online\/offline signatures. Journal of Criptology\u00a09, 35\u201367 (1996)","journal-title":"Journal of Criptology"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/BFb0055479","volume-title":"Financial Cryptography","author":"B. Fox","year":"1998","unstructured":"Fox, B., LaMacchia, B.: Certificate Revocation: Mechanics and Meaning. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 158\u2013164. Springer, Heidelberg (1998)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459 (1999)","DOI":"10.17487\/rfc2459"},{"key":"31_CR6","unstructured":"ITU\/ISO Recommendation. X.509 Information Technology Open Systems Interconnection - The Directory: Autentication Frameworks, Technical Corrigendum (2000)"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"Financial Cryptography","author":"P.C. Kocher","year":"1998","unstructured":"Kocher, P.C.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 172\u2013177. Springer, Heidelberg (1998)"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/BFb0011626","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1989","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 234\u2013246. Springer, Heidelberg (1989)"},{"key":"31_CR9","unstructured":"Micali, S.: Efficient certificate revocation. Technical Report TM-542b, MIT Laboratory for Computer Science (1996)"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-540-45215-7_21","volume-title":"Computer Network Security","author":"J.L. Mu\u00f1oz","year":"2003","unstructured":"Mu\u00f1oz, J.L., Forn\u00e9, J., Esparza, O., Soriano, M.: A Certificate Status Checking Protocol for the Authenticated Dictionary. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 255\u2013266. Springer, Heidelberg (2003)"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/ISCC.2003.1214128","volume-title":"The Eighth IEEE Symposium on Computers and Communications (ISCC 2003)","author":"J.L. Mu\u00f1oz","year":"2003","unstructured":"Mu\u00f1oz, J.L., Forn\u00e9, J., Esparza, O., Soriano, M.: Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. In: The Eighth IEEE Symposium on Computers and Communications (ISCC 2003), June 2003, vol.\u00a01, pp. 238\u2013243. IEEE Computer Society, Los Alamitos (2003)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, RFC 2560 (1999)","DOI":"10.17487\/rfc2560"},{"issue":"4","key":"31_CR13","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/49.839932","volume":"18","author":"M. Naor","year":"2000","unstructured":"Naor, M., Nissim, K.: Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications\u00a018(4), 560\u2013561 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"31_CR14","unstructured":"CCITT Recommendation X.500. The directory overview of concepts, models and services (1988)"},{"key":"31_CR15","unstructured":"ITU-T Recommendation X.680. Abstract syntax notation one (asn.1): Specification of basic notation (1995)"},{"key":"31_CR16","unstructured":"ITU-T Recommendation X.690. ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) (1995)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:41:02Z","timestamp":1559346062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}