{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T08:27:24Z","timestamp":1688459244893},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/bf03219921","type":"journal-article","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T08:18:04Z","timestamp":1342772284000},"page":"522-541","source":"Crossref","is-referenced-by-count":3,"title":["Int\u00e9grationfr de la signature num\u00e9rique au protocole SSL\/TLS"],"prefix":"10.1007","volume":"61","author":[{"given":"Ahmed","family":"Serhrouchni","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Hajjeh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03219921_CR1","unstructured":"Kambourakis (G.),Rouskas (A.),Gritzalis (S.), \u201cUsingSsl\/tls in Authentication and Key Agreement Procedures of future Mobile Networks\u201d,4th International workshop on mobile and wireless communications network, Stockholm, Sweden, September 2002."},{"key":"BF03219921_CR2","unstructured":"Wichert (M.),Ingham (D.),Caughey (S.), \u201cNon-repudiation Evidence Generation forCorba usingXml\u201d, 15th Annual Computer Security Applications Conference (Acsac\u203299), Phoenix, Arizona, December 1999."},{"key":"BF03219921_CR3","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1109\/GLOCOM.2003.1258484","volume":"3","author":"(I.) Hajjeh","year":"2003","unstructured":"Hajjeh (I.), Serhrouchni (A.), Tastet (F.), \u00abIsakmp Handshake forSsl\/tls \u00bb,Ieee globecom\u201903, Global Communications conference, San Francisco,Usa,3, pp. 1481\u20131485, December 2003.","journal-title":"Ieee globecom\u201903, Global Communications conference"},{"key":"BF03219921_CR4","unstructured":"Signature Syntax and Processing. The w3c and theIetf Sandard, March 2002, (Available at: http:\/\/www.w3.org\/Signature)"},{"key":"BF03219921_CR5","doi-asserted-by":"crossref","unstructured":"Kalishi (B.), \u201cPkcs #7 : Cryptographic Message Syntax Version 1.5\u201d,Rfc 2315, March 1998.","DOI":"10.17487\/rfc2315"},{"key":"BF03219921_CR6","doi-asserted-by":"crossref","unstructured":"Housley (R.), \u201cCryptographic Message Syntax\u201d. TheIetf, rfc 2630, June 1999.","DOI":"10.17487\/rfc2630"},{"key":"BF03219921_CR7","doi-asserted-by":"crossref","unstructured":"Dierks (T.), \u201cTheTls Protocol Version 1.0\u201d,Rfc 2246, January 1999.","DOI":"10.17487\/rfc2246"},{"key":"BF03219921_CR8","unstructured":"Freier (A.),Karlton (P.),Kocker (P.), \u00ab TheSsl Protocol, Version 3.0 \u00bb, Internet Draft, 1996. http:\/\/home.netscape.com\/eng\/ssl3\/ssl-toc.html."},{"key":"BF03219921_CR9","doi-asserted-by":"crossref","unstructured":"Blake-Wilson (S.),Nystrom (M.),Hopwood (D.),Mikkelsen (J.), \u201cTransport Layer Security (Tls) Extensions\u201d,Ietf, rfc 3546, June 2003.","DOI":"10.17487\/rfc3546"},{"key":"BF03219921_CR10","doi-asserted-by":"crossref","unstructured":"Shirey (R.), \u201cInternet Security Glossary\u201d,Ietf, rfc 2828, May 2000.","DOI":"10.17487\/rfc2828"},{"key":"BF03219921_CR11","unstructured":"Ford (W.),Baum (M.), \u201cSecure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption\u201d,Isbn 0-13-476342-4,Prentice Hall, 1997."},{"key":"BF03219921_CR12","unstructured":"TheGnutls project, (Available at: http:\/\/www.gnu.org\/software\/gnutls\/)"},{"key":"BF03219921_CR13","doi-asserted-by":"crossref","unstructured":"Kalishi (B.), \u201cPkcs#7: Cryptographic Message Syntax Version 1.5\u201d,Ietf, rfc 2315, March 1998","DOI":"10.17487\/rfc2315"},{"key":"BF03219921_CR14","unstructured":"Ylonen (T.),Moffat (D.), \u201cSsh Protocol Architecture\u201d,Ietf Internet Draft, \u201cdraft-ietf-secsh-architecture15.txt\u201d, October 2003"},{"key":"BF03219921_CR15","doi-asserted-by":"crossref","unstructured":"Kent (S.),Atkinson (R.), \u201cSecurity Architecture for the Internet Protocol\u201d,Ietf, rfc 2401, November 1998.","DOI":"10.17487\/rfc2401"},{"key":"BF03219921_CR16","doi-asserted-by":"crossref","unstructured":"Housley (R.), \u00ab Cryptographic Message Syntax (Cms) \u00bb,Ietf, rfc 3369, August 2002.","DOI":"10.17487\/rfc3369"},{"key":"BF03219921_CR17","doi-asserted-by":"crossref","unstructured":"Dusse (S.),Hoffman (P.),Ramsdell (B.),Lundblade (L.),Repka (L.), \u00abS\/mime Version 2 Message Specification \u00bb,Ietf, rfc 2311, March 1998.","DOI":"10.17487\/rfc2311"},{"key":"BF03219921_CR18","unstructured":"Snell (J.),Tidwell (D.),Kulchenko (P.), \u201cProgramming Web Services withSoap\u201d,O\u2019Reilly Publications, January 2002."},{"key":"BF03219921_CR19","unstructured":"Itu-t Recommendation X.509 (1997 E): Information Technology \u2014 Open Systems Interconnection \u2014 The Directory: Authentication Framework, June 1997."},{"key":"BF03219921_CR20","doi-asserted-by":"crossref","unstructured":"Srinivansan (R.), Sun Microsystems,Rfc 1832:Xdr: External Data Representation Standard, August 1995.","DOI":"10.17487\/rfc1832"},{"key":"BF03219921_CR21","unstructured":"Xml Encryption Syntax and Processing, The w3c Recommendation, 10 December 2002, (Available at: http:\/\/www.w3.org\/TR\/xmlenc-core\/)"},{"key":"BF03219921_CR22","unstructured":"Piette-Coudol (T.), \u00ab Les contraintes impos\u00e9es par le droit \u00e0 la signature \u00e9lectronique \u00bb. In the3rd Conference on Security and Network Architectures (SAR\u201904), France, Juin 2004."},{"issue":"6","key":"BF03219921_CR23","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"It-22","author":"(W.) Diffie","year":"l976","unstructured":"Diffie (W.), Hellman (M. E.), \u00ab New directions in cryptography \u00bb,Ieee Transactions on Information Theory,It-22, no 6, pp. 644\u2013654, Novemberl976.","journal-title":"Ieee Transactions on Information Theory"},{"key":"BF03219921_CR24","unstructured":"Official Site of Fortezza. http:\/\/www.armadillo.huntsville.al.us."},{"key":"BF03219921_CR25","unstructured":"Official Site of Openssl. http:\/\/www.openssl.org"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219921.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03219921\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T05:59:35Z","timestamp":1561960775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03219921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":25,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["BF03219921"],"URL":"https:\/\/doi.org\/10.1007\/bf03219921","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}