{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:22:01Z","timestamp":1725456121599},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540636960"},{"type":"electronic","value":"9783540696285"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028495","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T08:09:54Z","timestamp":1132646994000},"page":"398-408","source":"Crossref","is-referenced-by-count":6,"title":["Enforcing traceability in software"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"D. Aucsmith, \u201cTamper Resistant Software-An Implementation\u201d, Information Hiding, pp.317\u2013333, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61996-8_49"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"T. Beth, H.-J. Knobloch, M. Otten, G.J. Simmons, P. Wichmann, \u201cTowards Acceptable Key Escrow Systems\u201d, Proceedings of the 2nd ACM Conference on Communications and Computer Security, 1994, pp.51\u201358.","DOI":"10.1145\/191177.191191"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, \u201cProtocol Failure in the Escrowed Encryption Standard\u201d, 2nd ACM Conference on Computer and Communications Security, 1994, pp.59\u201367.","DOI":"10.1145\/191177.191193"},{"key":"39_CR4","unstructured":"E. Brickell, P. Gemmell, D. Kravitz, \u201cTrustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change\u201d, 1995 SIAM-ACM Symposium on Discrete Algorithms, pp.457\u2013466."},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"C. Boyd, \u201cSome Applications of Multiple Key Ciphers\u201d, Advances in Cryptology-Eurocrypt 88, Springer-Verlag 1988, pp.455\u2013467.","DOI":"10.1007\/3-540-45961-8_40"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.-M. Piveteau, M. Stadler, \u201cAn Efficient Fair Payment System\u201d, 3rd ACM Conference on Computer and Communications Security, ACM Press 1996, pp.88\u201394.","DOI":"10.1145\/238168.238193"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"E. Dawson, J. Goli\u0107 (Eds.), \u201cCryptography: Policy and Algorithms\u201d, Springer-Verlag, 1996.","DOI":"10.1007\/BFb0032342"},{"issue":"3","key":"39_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/227234.227239","volume":"39","author":"D. Denning","year":"1996","unstructured":"D. Denning and D. Branstad, \u201cA Taxonomy for Key Escrow Encryption Systems\u201d, Communications of the ACM, 39,3 March 1996, pp.34\u201340.","journal-title":"Communications of the ACM"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, \u201cSecuring Traceability of Ciphertexts-Towards a Secure Software Key Escrow System\u201d, Advances in Cryptology-Eurocrypt '95, Springer-Verlag 1995, pp.147\u2013157.","DOI":"10.1007\/3-540-49264-X_12"},{"issue":"6","key":"39_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, 22, 6, pp.644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms\u201d, IEEE Transaction on Information Theory, IT-31, 4, pp.469\u2013472, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"39_CR12","unstructured":"FIPS PUB 185, \u201cEscrowed Encryption Standard\u201d, US Department of Commerce\/National Institute of Standard and Technology, February 1994."},{"issue":"3","key":"39_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/240483.240493","volume":"39","author":"R. Ganesan","year":"1996","unstructured":"R. Ganesan, \u201cThe Yaksha System\u201d, Communications of the ACM, 39,3 March 1996, pp.55\u201360.","journal-title":"Communications of the ACM"},{"key":"39_CR14","unstructured":"P. Horster, M. Michels, H. Petersen, \u201cA New Key Escrow System with Active Investigator\u201d, Technical Report TR-95-4-F, University of Technology, ChemnitzZwickau, April 1995."},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"N. Jefferies, C. Mitchell, M. Walker, \u201cA Proposed Architecture for Trusted Third Party Services\u201d, Cryptography: Policy and Algorithms, LNCS 1029, Springer-Verlag, 1996, pp.98\u2013104.","DOI":"10.1007\/BFb0032349"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"J. Kilian, T. Leighton, \u201cFair Cryptosystems, Revisited\u201d Advances in Cryptology-Crypto 95, Springer-Verlag, 1995, pp.208\u2013221.","DOI":"10.1007\/3-540-44750-4_17"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"L. Knudsen and T. Pedersen, \u201cOn the Difficulty of Software Key Escrow\u201d, Advances in Cryptology-Eurocrypt 96, Springer-Verlag 1996, pp.237\u2013244.","DOI":"10.1007\/3-540-68339-9_21"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"B. Preneel, P. C. van Oorschot, \u201cMDx-MAC and Building Fast MACs from Hash Functions, Advances in Cryptology-Crypto 95, Springer-Verlag, 1995, pp.1\u201314.","DOI":"10.1007\/3-540-44750-4_1"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:58:21Z","timestamp":1586573901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/bfb0028495","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}