{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:07:03Z","timestamp":1725566823183},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540242529"},{"type":"electronic","value":"9783540301837"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30183-7_24","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T19:38:18Z","timestamp":1285270698000},"page":"250-258","source":"Crossref","is-referenced-by-count":17,"title":["Peer-to-Peer Authentication with a Distributed Single Sign-On Service"],"prefix":"10.1007","author":[{"given":"William K.","family":"Josephson","sequence":"first","affiliation":[]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[]},{"given":"Fred B.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/BFb0052254","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Frankel","year":"1997","unstructured":"Frankel, Y., Gemmell, P., Mackenzie, P., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 440\u2013455. Springer, Heidelberg (1997)"},{"issue":"5","key":"24_CR3","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/49.223866","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L.: Increasing availability and security of an authentication service. IEEE J. Select. Areas Commun.\u00a011(5), 657\u2013662 (1993)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"24_CR4","unstructured":"Liberty Alliance Project. Introduction to the liberty alliance identity architecture (March 2003)"},{"key":"24_CR5","unstructured":"Organization for the Advancement of Structured Information Standards (February 2004), http:\/\/www.oasis-open.org"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing, pp. 51\u201359 (1991)","DOI":"10.1145\/112600.112605"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BFb0055722","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"T. Rabin","year":"1998","unstructured":"Rabin, T.: A simplified approach to threshold and proactive RSA. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 89\u2013104. Springer, Heidelberg (1998)"},{"key":"24_CR8","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An authentication service for open network systems. In: Proceedings of the Winter 1988 Usenix Conference (February 1988)"},{"issue":"4","key":"24_CR9","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L. Zhou","year":"2002","unstructured":"Zhou, L., Schneider, F.B., van Renesse, R.: COCA: A secure distributed on-line certification authority. ACM Transactions on Computing Systems\u00a020(4), 329\u2013368 (2002)","journal-title":"ACM Transactions on Computing Systems"}],"container-title":["Lecture Notes in Computer Science","Peer-to-Peer Systems III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30183-7_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:46:07Z","timestamp":1605761167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30183-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540242529","9783540301837"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30183-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}