{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:36Z","timestamp":1725574056888},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220541"},{"type":"electronic","value":"9783540247074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24707-4_103","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T17:05:36Z","timestamp":1294419936000},"page":"903-914","source":"Crossref","is-referenced-by-count":2,"title":["Timeout Estimation Using a Simulation Model for Non-repudiation Protocols"],"prefix":"10.1007","author":[{"given":"Mildrey","family":"Carbonell","sequence":"first","affiliation":[]},{"given":"Jose A.","family":"Onieva","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Deborah","family":"Galpert","sequence":"additional","affiliation":[]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"103_CR1","doi-asserted-by":"crossref","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of 1996 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1996, pp. 55\u201361 (1996)","DOI":"10.1109\/SECPRI.1996.502669"},{"key":"103_CR2","doi-asserted-by":"crossref","unstructured":"Gonzalez-Deleito, N., Markowitch, O.: An optimistic multi-party fair exchange protocol with reduced trust requirements. In: Proceedings of 4th International Conference on Information Security and Cryptology, Seoul, Korea, December 2001, pp. 258\u2013267 (2001)","DOI":"10.1007\/3-540-45861-1_20"},{"key":"103_CR3","unstructured":"Kim, J., Ryou, J.: Multi-party fair exchange protocol using ring architecture model. In: Proceedings of Japan-Korea Joint Workshop on Information Security and Cryptology (January 2000)"},{"key":"103_CR4","doi-asserted-by":"crossref","unstructured":"Markowitch, O., Kremer, S.: A multi-party non-repudiation protocol. In: Proceedings of 15th IFIP International Information Security Conference, Beijing, China, August 2000, pp. 271\u2013280 (2000)","DOI":"10.1007\/978-0-387-35515-3_28"},{"key":"103_CR5","doi-asserted-by":"crossref","unstructured":"Markowitch, O., Kremer, S.: A multi-party optimistic non-repudiation protocol. In: Proceedings of 3rd International Conference on Information Security and Cryptology, Seoul, Korea, December 2000, pp. 109\u2013122 (2000)","DOI":"10.1007\/3-540-45247-8_9"},{"key":"103_CR6","doi-asserted-by":"crossref","unstructured":"Onieva, J., Zhou, J., Carbonell, M., Lopez, J.: A multi-party non-repudiation protocol for exchange of different messages. In: Proceedings of 18th IFIP International Information Security Conference, Athens, Greece (May 2003)","DOI":"10.1007\/978-0-387-35691-4_4"},{"key":"103_CR7","doi-asserted-by":"crossref","unstructured":"Onieva, J., Zhou, J., Carbonell, M., Lopez, J.: Intermediary non-repudiation protocols. In: Proceedings of IEEE Conference on Electronic Commerce, Newport Beach, CA (June 2003)","DOI":"10.1109\/COEC.2003.1210251"},{"key":"103_CR8","doi-asserted-by":"crossref","unstructured":"Chiou, G., Chen, W.: Secure broadcasting using the secure lock. IEEE Transaction on Software Engineering\u00a015(8) (August 1989)","DOI":"10.1109\/32.31350"},{"key":"103_CR9","volume-title":"Discrete-event system simulation","author":"J. Banks","year":"2000","unstructured":"Banks, J., Carson, J., Nelson, B.: Discrete-event system simulation. Prentice-Hall, Englewood Cliffs (2000)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24707-4_103.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:54:20Z","timestamp":1605761660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24707-4_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220541","9783540247074"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24707-4_103","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}