{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:46:00Z","timestamp":1725565560040},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_1","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T22:02:45Z","timestamp":1284156165000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["A New Digital Signature and Certificate Architecture with Shortest Certification Path"],"prefix":"10.1007","author":[{"given":"Sung Keun","family":"Song","sequence":"first","affiliation":[]},{"given":"Hee Yong","family":"Youn","sequence":"additional","affiliation":[]},{"given":"Kang Shin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Polk, Hastings, Ambarish Malpani.: Public Key Infrastructures that Satisfy Security Goals","author":"T William","year":"2003","unstructured":"William, T., Nelson E., Polk, Hastings, Ambarish Malpani.: Public Key Infrastructures that Satisfy Security Goals, IEEE Internet Computing. (2003)"},{"key":"1_CR2","unstructured":"William, E., Burr, Noel, A., Nazario and W. Timothy Polk.: A Proposed Federal PKI Using X.509 V3 Certificates. NIST. \n                    http:\/\/csrc.nist.gov\n                    \n                  \/nissc\/1996\/papers\/NISSC96\/paper042\/pkipapl.pdf"},{"key":"1_CR3","volume-title":"Internet X.509 Public Key Infrastructure Time Stamp Protocol. draft-ietf-pkix-time-stamp-OO","author":"C Adams","year":"1998","unstructured":"Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: Internet X.509 Public Key Infrastructure Time Stamp Protocol. draft-ietf-pkix-time-stamp-OO.txt. (1998)"},{"key":"1_CR4","volume-title":"Internet X.509 Public Key Infrastructure","author":"R Housely","year":"1999","unstructured":"Housely, R., Ford, W, Polk, W, Solo, D.: Internet X.509 Public Key Infrastructure. IETF RFC 2459. (1999)"},{"key":"1_CR5","unstructured":"National Institute of Standards and Technology (NIST).: Digital Signature Standard. FIPS PUB 186\u20132. (2000). \n                    http:\/\/csrc.nist.gov\n                    \n                  \/publications\/fips\/fips186\u20132\/fips186\u20132-changel.pdf"},{"key":"1_CR6","unstructured":"National Institute of Standards and Technology (NIST).: Secure Hash Standard. FIPS PUB 180\u20131. (1995). \n                    http:\/\/www.itl.nist.gov\n                    \n                  \/fipspubs\/fip180\u20131.htm"},{"key":"1_CR7","first-page":"2","volume":"2","author":"H Dobbertin","year":"1996","unstructured":"Dobbertin, H.: The status of MD5 after a recent attack. RSA Laboratories. CryptoBytes, 2(2). (1996)","journal-title":"CryptoBytes"},{"key":"1_CR8","volume-title":"US Secure Hash Algorithm 1 (SHA1)","author":"D Eastlake","year":"2001","unstructured":"Eastlake, D. 3rd, Jones, P.: US Secure Hash Algorithm 1 (SHA1). RFC 3174. (2001) \n                    http:\/\/www.faqs.org\n                    \n                  \/rfcs\/rfc3174.html"},{"key":"1_CR9","volume-title":"The Use of HMAC-RIPEMD-160\u201396 within ESP and AH","author":"A Keromytis","year":"2000","unstructured":"Keromytis, A., Provos, N.: The Use of HMAC-RIPEMD-160\u201396 within ESP and AH. RFC 2857. (2000)"},{"key":"1_CR10","first-page":"416","volume-title":"A design principle for hash functions. Advances in Cryptology-Crypto \u201989, Lecture Notes in Computer Science, vol. 435","author":"IB Damgard","year":"1990","unstructured":"Damgard, I.B.: A design principle for hash functions. Advances in Cryptology-Crypto \u201989, Lecture Notes in Computer Science, vol. 435, Springer-Verlag, (1990) 416\u2013427"},{"key":"1_CR11","doi-asserted-by":"crossref","first-page":"120","DOI":"10.21236\/ADA606588","volume-title":"A Method for Obtaining Digital Signatures and Public Key Cryptosystems","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, (1978) 120\u2013126"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory, IT-31, No. 4, (1985) 469\u2013472","journal-title":"IEEE Trans. Info. Theory"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:03:10Z","timestamp":1619996590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}