{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:29Z","timestamp":1725467549287},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055479","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:10:06Z","timestamp":1153977006000},"page":"158-164","source":"Crossref","is-referenced-by-count":22,"title":["Certificate revocation: Mechanics and meaning"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Fox","sequence":"first","affiliation":[]},{"given":"Brian","family":"LaMacchia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"11_CR1","unstructured":"Warwick Ford and Michael Baum, Secure Electronic Commerce, Prentice Hall, 1997."},{"key":"11_CR2","unstructured":"OpenPGP Working Group, Internet Engineering Task Force. \u201cOP Formats \u2014 OpenPGP Message Format,\u201d Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, eds., work in progress. (Draft as of March, 1998, available from http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-openpgp-formats-01.txt.)"},{"key":"11_CR3","unstructured":"J. O'Reilley. Information Security Strategies (ISS), Research Note, Key Issue Analysis, The Gartner Group, 21 July 1997."},{"key":"11_CR4","unstructured":"PKIX Working Group, Internet Engineering Task Force. \u201cInternet Public Key Infrastructure: X.509 Certificate and CRL, Profile,\u201d R. Housley, W. Ford, W. Polk, D. Solo, eds., work in progress. (Draft as of March, 1998, available from http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-pkix-ipki-partl-07.txt.)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T11:23:38Z","timestamp":1549884218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/bfb0055479","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}