{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:18:19Z","timestamp":1743056299584,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_2","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T14:34:44Z","timestamp":1252938884000},"page":"19-36","source":"Crossref","is-referenced-by-count":1,"title":["User-Centric Handling of Identity Agent Compromise"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Mashima","sequence":"first","affiliation":[]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[]},{"given":"Swagath","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Hansen, M., Berlich, P., Camenisch, J., Clau\u00df, S., Pfitzmann, A., Waidner, M.: Privacy-Enhancing Identity Management. Information Security Technical Report (ISTR)\u00a09(1) (2004)","DOI":"10.1016\/S1363-4127(04)00014-7"},{"key":"2_CR2","unstructured":"Chappell, D., et al.: Introducing Windows CardSpace, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/library\/aa480189.aspx"},{"key":"2_CR3","unstructured":"Bauer, D., et al.: Video demonstration of Credential-Holding Remote Identity Agent (2007), \n                    \n                      http:\/\/users.ece.gatech.edu\/gte810u\/RIDA_Video"},{"key":"2_CR4","unstructured":"Ahamad, M., et al.: GUIDE-ME: Georgia Tech User Centric Identity Management Environment. In: Digital Identity Systems Workshop, New York (2007)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Lampson, B., et al.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems\u00a010(4) (1992)","DOI":"10.1145\/138873.138874"},{"key":"2_CR6","unstructured":"Microsoft and Ping Identity, A Guide to Integrating with InfoCard v1.0, \n                    \n                      http:\/\/download.microsoft.com\/download\/6\/c\/3\/6c3c2ba2-e5f0-4fe3-be7f-c5dcb86af6de\/infocard-guide-beta2-published.pdf"},{"key":"2_CR7","unstructured":"U-Prove Technology, \n                    \n                      http:\/\/www.credentica.com\/u-prove_sdk.html"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Mashima, D., Ahamad, M.: Towards a User-Centric Identity-Usage Monitoring System, In: Proc. of ICIMP 2008 (2008)","DOI":"10.1109\/ICIMP.2008.22"},{"key":"2_CR9","unstructured":"Cameron, K.: The Laws of Identity (2004), \n                    \n                      http:\/\/www.identityblog.com\/"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Bauer, D., Blough, D., Cash, D.: Minimal Information Disclosure with Efficiently Verifiable Credentials, In: Proc. of the Workshop on Digital Identity Management (2008)","DOI":"10.1145\/1456424.1456428"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: A Platform for User-Centric Identity Management. In: Proceedings of the 2nd ACM workshop on DIM (2006)","DOI":"10.1145\/1179529.1179532"},{"key":"2_CR12","unstructured":"Shibboleth, \n                    \n                      http:\/\/shibboleth.internet2.edu"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y.G. Desmedt","year":"1990","unstructured":"Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 207\u2013220. Springer, Heidelberg (2000)"},{"key":"2_CR15","unstructured":"Java Threshold Signature Package, \n                    \n                      http:\/\/sourceforge.net\/projects\/threshsig\/"},{"key":"2_CR16","unstructured":"Akamai Technologies. Retail Web Site Performance (2006), \n                    \n                      http:\/\/www.akamai.com\/4seconds"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., et al.: User Centricity: A Taxonomy and Open Issues. Journal of Computer Security (2007)","DOI":"10.1145\/1179529.1179531"},{"key":"2_CR18","unstructured":"RSA SecureID, \n                    \n                      http:\/\/www.rsa.com\/"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Jaeger, T., et al.: PRIMA: Policy Reduced Integrity Measurement Architecture. In: The 11th ACM Symp. on Access Controll Models and Technologies (2006)","DOI":"10.1145\/1133058.1133063"},{"key":"2_CR20","unstructured":"Liberty Alliance Project. Liberty Alliance ID-FF 1.2 Specifications, \n                    \n                      http:\/\/www.projectliberty.org\/"},{"key":"2_CR21","unstructured":"Hardt, D., et al.: OpenID Attribute Exchange 1.0 - Final, \n                    \n                      http:\/\/openid.net\/specs\/openid-attribute-exchange-1_0.html"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Some Recent Research Aspects of Threshold Cryptography. LNCS (1997)","DOI":"10.1007\/BFb0030418"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, L., et al.: COCA: A secure distributed on-line certification authority. ACM Transaction on Computer Systems (2002)","DOI":"10.1145\/571637.571638"},{"key":"2_CR24","unstructured":"Yi, S., et al.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In: The 2nd Annual PKI Research Workshop Pre-Proceedings (2003)"},{"key":"2_CR25","unstructured":"MacKenzie, P., Reiter, M.K.: Networked cryptographic devices resilient to capture. In: Proc. of IEEE Symposium on Security and Privacy (2001)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:16:52Z","timestamp":1559506612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}