{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:12Z","timestamp":1725562392163},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_16","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T11:18:44Z","timestamp":1280747924000},"page":"194-207","source":"Crossref","is-referenced-by-count":5,"title":["Improving Robustness of PGP Keyrings by Conflict Detection"],"prefix":"10.1007","author":[{"given":"Qinglin","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Douglas S.","family":"Reeves","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"Network flows : theory, algorithms, and applications","author":"R. Ahuja","year":"1993","unstructured":"Ahuja, R., Magnanti, T., Orlin, J.: Network flows: theory, algorithms, and applications. Prentice Hall, Englewood Cliffs (1993)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 3\u201318. Springer, Heidelberg (1994)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 6-8, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Burmester, M., Desmedt, Y., Kabatianski, G.A.: Trust and security: A new look at the byzantine generals problem. In: Proceedings of the DIMACS Workshop on Network Threats, December 1996. DIMACS, vol.\u00a038, American Mathematical Society Publications (1996)","DOI":"10.1090\/dimacs\/038\/08"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS 20), MIT Faculty Club, Cambridge, MA, USA (March 2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC 2693: SPKI certificate theory (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"16_CR7","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W H Freeman & Co., New York (1979)"},{"key":"16_CR8","unstructured":"Jiang, Q., Reeves, D.S., Ning, P.: Improving robustness of PGP keyrings by conflict detection. Technical Report TR-2003-19, Department of Computer Science, N.C. State University (October 2003)"},{"issue":"1","key":"16_CR9","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S0004-3702(02)00259-X","volume":"141","author":"A. Josang","year":"2002","unstructured":"Josang, A.: The consensus operator for combining beliefs. Artificial Intelligence\u00a0141(1), 157\u2013170 (2002)","journal-title":"Artificial Intelligence"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Khanna, S., Motwani, R., Sudan, M., Vazirani, U.V.: On syntactic versus computational views of approximability. In: IEEE Symposium on Foundations of Computer Science, pp. 819\u2013830 (1994)","DOI":"10.1109\/SFCS.1994.365712"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-68339-9","volume-title":"Computer Security - ESORICS 96","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 324\u2013350. Springer, Heidelberg (1996)"},{"key":"16_CR12","unstructured":"Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: Universal topology generation from a user\u2019s perspective. Technical Report BU-CSTR- 2001-003, Boston University (2001)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Mendes, S., Huitema, C.: A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In: Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, USA, February 1995, pp. 172\u2013189 (1995)","DOI":"10.1109\/NDSS.1995.390635"},{"key":"16_CR14","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Reiter, M., Stubblebine, S.: Toward acceptable metrics of authentication. In: IEEE Symposium on Security and Privacy, pp. 10\u201320 (1997)","DOI":"10.1109\/SECPRI.1997.601308"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Reiter, M., Stubblebine, S.: Resilient authentication using path independence. IEEE Transactions on Computers 47(12) (December 1998)","DOI":"10.1109\/12.737682"},{"key":"16_CR17","unstructured":"Drew Streib, M.: Keyanalyze - analysis of a large OpenPGP ring, http:\/\/www.dtype.org\/keyanalyze\/"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BFb0013898","volume-title":"Computer Security - ESORICS 92","author":"A. Tarah","year":"1992","unstructured":"Tarah, A., Huitema, C.: Associating metrics to certification paths. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, pp. 175\u2013189. Springer, Heidelberg (1992)"},{"key":"16_CR19","unstructured":"Int\u2019l Telecommunications Union\/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks (March 2000)"},{"key":"16_CR20","volume-title":"The official PGP user\u2019s guide","author":"P. Zimmermann","year":"1995","unstructured":"Zimmermann, P.: The official PGP user\u2019s guide. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:31:07Z","timestamp":1559345467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}