{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:35Z","timestamp":1725558815832},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245735"},{"type":"electronic","value":"9783540305767"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_6","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T15:03:26Z","timestamp":1278255806000},"page":"86-103","source":"Crossref","is-referenced-by-count":15,"title":["Comparing Two Notions of Simulatability"],"prefix":"10.1007","author":[{"given":"Dennis","family":"Hofheinz","sequence":"first","affiliation":[]},{"given":"Dominique","family":"Unruh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Backes, M.: E-mail communication with the authors (June 2004)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-540-24638-1_19","volume-title":"Theory of Cryptography","author":"M. Backes","year":"2004","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: A general composition theorem for secure reactive systems. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 336\u2013354. Springer, Heidelberg (2004), Online available at \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/publications\/2004\/BaPfWa2004MoreGeneralComposition.pdf"},{"key":"6_CR3","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Secure asynchronous reactive systems. IACR ePrint Archive (March 2004), Online available at \n                    \n                      http:\/\/eprint.iacr.org\/2004\/082.ps"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"3","author":"R. Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology\u00a03(1), 143\u2013202 (2000), Full version online available at \n                    \n                      http:\/\/eprint.iacr.org\/1998\/018.ps","journal-title":"Journal of Cryptology"},{"key":"6_CR5","first-page":"136","volume-title":"42th Annual Symposium on Foundations of Computer Science, Proceedings of FOCS 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42th Annual Symposium on Foundations of Computer Science, Proceedings of FOCS 2001, pp. 136\u2013145. IEEE Computer Society, Los Alamitos (2001), Full version online available at \n                    \n                      http:\/\/eprint.iacr.org\/2000\/067.ps"},{"key":"6_CR6","unstructured":"Canetti, R.: Personal communication with one of the authors at TCC (February 2004)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/509907.509980","volume-title":"34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: 34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002, pp. 494\u2013503. ACM Press, New York (2002), Extended abstract, full version online available at \n                    \n                      http:\/\/eprint.iacr.org\/2002\/140.ps"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/SFCS.2003.1238213","volume-title":"44th Annual Symposium on Foundations of Computer Science, Proceedings of FOCS 2003","author":"Y. Lindell","year":"2003","unstructured":"Lindell, Y.: General composition and universal composability in secure multi-party computation. In: 44th Annual Symposium on Foundations of Computer Science, Proceedings of FOCS 2003, pp. 394\u2013403. IEEE Computer Society, Los Alamitos (2003), Online available at \n                    \n                      http:\/\/www.research.ibm.com\/people\/l\/lindell\/PAPERS\/\n                    \n                    \n                  \n                  \n                    \n                      gc-uc.ps.gz"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1145\/352600.352639","volume-title":"7th ACM Conference on Computer and Communications Security, Proceedings of CCS 2000","author":"B. Pfitzmann","year":"2000","unstructured":"Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: 7th ACM Conference on Computer and Communications Security, Proceedings of CCS 2000, pp. 245\u2013254. ACM Press, New York (2000), Extended version online available at \n                    \n                      http:\/\/www.semper.org\/sirene\/publ\/PfWa_00CompInt.ps.gz"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/SECPRI.2001.924298","volume-title":"IEEE Symposium on Security and Privacy, Proceedings of SSP 2001","author":"B. Pfitzmann","year":"2001","unstructured":"Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Security and Privacy, Proceedings of SSP 2001, pp. 184\u2013200. IEEE Computer Society, Los Alamitos (2001), Full version online available at \n                    \n                      http:\/\/eprint.iacr.org\/2000\/066.ps"},{"key":"6_CR11","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical Report MIT\/LCS\/TR-684, Massachusetts Institute of Technology (February 1996), Online available at \n                    \n                      http:\/\/theory.lcs.mit.edu\/~rivest\/RivestShamirWagner-timelock.ps"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:30:59Z","timestamp":1619998259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}