{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:12Z","timestamp":1774946352154,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055749","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"486-501","source":"Crossref","is-referenced-by-count":58,"title":["Time-stamping with binary linking schemes"],"prefix":"10.1007","author":[{"given":"Ahto","family":"Buldas","sequence":"first","affiliation":[]},{"given":"Peeter","family":"Laud","sequence":"additional","affiliation":[]},{"given":"Helger","family":"Lipmaa","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Villemson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Michael Burrows, Mart\u00edn Abadi, and Roger Needham. A Logic of Authentication. SRC Research Reports 39, DEC's System Research Center, February 1989.","DOI":"10.1145\/74850.74852"},{"key":"34_CR2","unstructured":"Josh Benaloh and Michael de Mare. Efficient Broadcast time-stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science, August 1991."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Dave Bayer, Stuart Haber, and W. Scott Stornetta. Improving the efficiency and reliability of digital time-stamping. In Sequences'91: Methods in Communication, Security, and Computer Science, pages 329\u2013334. Springer-Verlag, 1992.","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"34_CR4","unstructured":"Stephen W. Hawking. A Brief History of Time: From the Big Bang to Black Holes. Bantam Books, April 1988."},{"issue":"2","key":"34_CR5","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"Stuart Haber and W.-Scott Stornetta. How to Time-Stamp a Digital Document. Journal of Cryptology, 3(2):99\u2013111, 1991.","journal-title":"Journal of Cryptology"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Stuart Haber and W.-Scott Stornetta. Secure Names for Bit-Strings. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28\u201335, April 1997.","DOI":"10.1145\/266420.266430"},{"key":"34_CR7","unstructured":"Mike Just. Some Timestamping Protocol Failures. In Internet Society Symposium on Network and Distributed System Security, 1998. Available at http:\/\/www.ses.carleton.ca\/~just\/."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"34_CR9","unstructured":"Henry Massias and Jean Jacques Quisquater. Time and Cryptography. Technical report, Universit\u00e9 catholique de Louvain, March 1997. TIMESEC Technical Report WP1."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T14:36:58Z","timestamp":1587134218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0055749","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}