{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:37Z","timestamp":1725467557338},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649557"},{"type":"electronic","value":"9783540499145"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055299","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:10:27Z","timestamp":1153977027000},"page":"3-14","source":"Crossref","is-referenced-by-count":6,"title":["A secure, accountable, and collaborative whiteboard"],"prefix":"10.1007","author":[{"given":"Werner","family":"Geyer","sequence":"first","affiliation":[]},{"given":"R\u00fcdiger","family":"Weis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,27]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., Biham, E., \u201dTwo Practical and Provable Secure Blockciphers: BEAR and LION\u201d, Proc. Fast Software Encryption (ed. D. Gollmann), LNCS 1039, Springer, 1996.","DOI":"10.1007\/3-540-60865-6_48"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bacher, C., Ottmann, T., \u201dTools and Services for Authoring on the Fly\u201d, Proc. ED-MEDIA'96, Boston 1996.","DOI":"10.1007\/978-3-642-80350-5_59"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Diffie, W., Rivest, R., Schneier, B., Shimomura, T., Thompson, E., Wiener, M., \u201dMinimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security\u201d, a report by an ad hoc group of cryptographers and computer scientists, January 1996.","DOI":"10.21236\/ADA385264"},{"key":"3_CR4","unstructured":"Eckert, A., Geyer, W., Effelsberg, W., \u201dA Distance Learning System for Higher Education Based on Telecommunications and Multimedia \u2014 A Compound Organizational, Pedagogical, and Technical Approach\u201d, Proc. ED-MEDIA'97, Calgary, June 1997."},{"key":"3_CR5","unstructured":"Geyer, W., Effelsberg, W., \u201dThe Digital Lecture Board \u2014 A Teaching and Learning Tool for Remote Instruction in Higher Education\u201d, accepted at ED-MEDIA'98, Freiburg, Germany, June 1998."},{"key":"3_CR6","volume-title":"Multimediales Lernen in der beruflichen Bildung","author":"W. Geyer","year":"1997","unstructured":"Geyer, W., Eckert, A., Effelsberg, W.,\u201dMultimedia Technologie zur Un-terst\u00fctzung der Lehre an Hochschulen\u201d (in German). To appear in: Multimediales Lernen in der beruflichen Bildung, Verlag BW, N\u00fcrnberg 1997."},{"key":"3_CR7","first-page":"364","volume":"1309","author":"V. Hilt","year":"1997","unstructured":"Hilt, V., Geyer, W., \u201dA Model for Collaborative Services in Distributed Learning Environments\u201d, Proc. of IDMS'97, Darmstadt, LNCS 1309, 1997, pp. 364\u2013375.","journal-title":"LNCS"},{"key":"3_CR8","first-page":"131","volume":"1045","author":"E. Hinsch","year":"1996","unstructured":"Hinsch, E., Jaegemann, A., Wang, L., \u201dThe Secure Conferencing User Agent \u2014 A Tool to Provide Secure Conferencing with MBONE Multimedia Conferencing Applications\u201d. Proc. IDMS'96, Berlin, LNCS 1045, 1996, pp. 131\u2013142.","journal-title":"LNCS"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Holfelder, W., \u201dInteractive Remote Recording and Playback of Multicast Videoconferences\u201d, Proc. IDMS'97, Darmstadt, LNCS 1309, 1997.","DOI":"10.1007\/BFb0000375"},{"key":"3_CR10","volume-title":"Proc. Advances in Cryptology-Crypto'96","author":"J. Kilian","year":"1996","unstructured":"Kilian, J., Rogaway, P., \u201dHow to protect DES against exhaustive key search\u201d, Proc. Advances in Cryptology-Crypto'96, Berlin, Springer, 1996."},{"key":"3_CR11","unstructured":"Koch, Werner, \u201dGPG \u2014 The free PGP Replacement\u201d, 1998. http:\/\/www.d.shuttle.de\/isil\/gnupg.html"},{"key":"3_CR12","volume-title":"ETH Series in Information Processing, v. 1","author":"X. Lai","year":"1992","unstructured":"X. Lai, \u201dOn the Design and Security of Blockciphers\u201d, ETH Series in Information Processing, v. 1, Hartmut-Gorre-Verlag, Konstanz, 1992."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Lamport, L., \u201dPassword Authentication with Insecure Communication\u201d, Communications of the ACM 24(11), November 1981.","DOI":"10.1145\/358790.358797"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Luby, M., Rackoff, C., \u201dHow to construct pseudorandom permutations from pseudo random functions\u201d, SIAM J. Computing, V17, N2, 1988.","DOI":"10.1137\/0217022"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Lucks, S., \u201dFaster Luby-Rackoff ciphers\u201d, Proc. Fast Software Encryption (ed. D. Gollmann), LNCS 1039, Springer, 1996.","DOI":"10.1007\/3-540-60865-6_53"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lucks, S., \u201dBEAST: A fast block cipher for arbitrary blocksize\u201d, (ed. Hoprster, P.), Proc. IFIP'96, Conference on Communication and Multimedia Security, Chapman & Hall, 1996, pp. 144\u2013153.","DOI":"10.1007\/978-0-387-35083-7_13"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Lucks, S., \u201dAttacking Triple Encryption\u201d, Proc. Fast Software Encryption 5, 1998, (ed. S. Vaudenay), LNCS 1372, Springer, 1998.","DOI":"10.1007\/3-540-69710-1_16"},{"key":"3_CR18","unstructured":"Lucks, S., \u201dOn the Power of Whitening\u201d, Manuscript, Universtit\u00c4t Mannheim, Fakult\u00c4t f\u00fcr Mathematik und Informatik, 1998."},{"key":"3_CR19","unstructured":"Lucks, S., Weis, R., \u201dHow to Encrypt with Rabin\u201d, Technical Report, Universtit\u00c4t Mannheim, Fakult\u00c4t Mathematik und Informatik, 1998."},{"key":"3_CR20","unstructured":"Lucks, S., Weis, R., \u201dImproced Security throw Redundant Random Oracle\u201d, Technical Report, Universtit\u00c4t Mannheim, Fakult\u00c4t Mathematik und Informatik, 1998."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Macedonia, M.R., Brutzmann, D.P., \u201dMBone Provides Audio and Video Across the Internet\u201d, IEEE Computer. 27(4), 1994.","DOI":"10.1109\/2.274996"},{"issue":"1","key":"3_CR22","first-page":"44","volume":"34","author":"K. Maly","year":"1996","unstructured":"Maly, K., Wild, C., Overstreet, C., Abdel-Wahab, H., Gupta, A., Youssef, A., Stoica, E., Talla, R.,Prabhu, A., \u201dVirtual Classrooms and Interactive Remote Instruction\u201d, International Journal of Innovations in Education\u201d, 34(1), 1996, pp. 44\u201351.","journal-title":"International Journal of Innovations in Education"},{"key":"3_CR23","unstructured":"Multimedia European Research Conferencing Integration, Telematics for Research Project 1007, 1996\u20131998. http:\/\/www-mice.cs.ucl.ac.uk\/mice\/ merci\/"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finnley, H., \u201dOP Formats \u2014 OpenPGP Message Format\u201d, Internet Draft, November 1997.","DOI":"10.17487\/rfc2440"},{"key":"3_CR25","unstructured":"Ousterhout, J. K., \u201dTcl and Tk Toolkit\u201d, Addison-Wesley, 1994."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Adams, C., \u201dThe CAST-128 Encryption Algorithm\u201d, May 1997.","DOI":"10.17487\/rfc2144"},{"key":"3_CR27","unstructured":"Rivest, R., Shamir, A., \u201dPayword and Micromint\u201d, to appear, http:\/\/theory.lcs.mit.edu\/ rivest\/RivestShamir-mpay.ps"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Schneier, B., \u201dDescription of a New Variable-Length Key, 64-Bit Block Cipher\u201d, Proc. Cambridge Security Workshop on Fast Software Encryption, LNCS 809, Springer, 1994, pp. 191\u2013204.","DOI":"10.1007\/3-540-58108-1_24"},{"key":"3_CR29","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobsen, V., \u201dRTP: A Transport Protocol for Real-Time Applications\u201d, Internet RfC 1889, IETF, Audio-Video Transport Working Group, 1996."},{"key":"3_CR30","unstructured":"Part of the Telematics for Research Project 1007 MERCI, 1996\u20131998. http:\/\/www.uni-stuttgart.de\/Rus\/Projects\/MERCI\/MERCI\/TeleDraw\/Info.html"},{"key":"3_CR31","volume-title":"Kryptographie","author":"R. Weis","year":"1998","unstructured":"Weis, R., \u201dModerne Blockchiffrierer\u201d (in German), in: \u201dKryptographie\u201d, Weka-Fachzeitschriften-Verlag, Poing, 1998."},{"key":"3_CR32","unstructured":"Weis, R., Lucks,S., \u201dFaster Software Encryption\u201d, Technical Report, Universtit\u00c4t Mannheim, Fakult\u00c4t Mathematik und Informatik, 1998."}],"container-title":["Lecture Notes in Computer Science","Interactive Distributed Multimedia Systems and Telecommunication Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T04:35:13Z","timestamp":1555734913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649557","9783540499145"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/bfb0055299","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}