{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:05:43Z","timestamp":1648937143487},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1007\/s10207-003-0019-3","type":"journal-article","created":{"date-parts":[[2003,12,11]],"date-time":"2003-12-11T00:44:12Z","timestamp":1071103452000},"page":"223-235","source":"Crossref","is-referenced-by-count":12,"title":["Fair multi-party non-repudiation protocols"],"prefix":"10.1007","volume":"1","author":[{"given":"Steve","family":"Kremer","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,7,1]]},"reference":[{"key":"19_CR1","unstructured":"Asokan N (1998) Fairness in Electronic Commerce. PhD thesis, University of Waterloo"},{"key":"19_CR2","unstructured":"Asokan N, Baum-Waidner B, Schunter M, Waidner M (1998) Optimistic synchronous multi-party contract signing. Research Report RZ 3089, IBM Research Division"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Asokan N, Schunter M, Waidner M (1996) Optimistic protocols for multi-party fair exchange. Research Report RZ 2892 (# 90840), IBM Research","DOI":"10.1145\/266420.266426"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Asokan N, Schunter M, Waidner M (1997) Optimistic protocols for fair exchange. In: Matsumoto T (ed) 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, ACM Press, pp 6, 8\u201317","DOI":"10.1145\/266420.266426"},{"key":"19_CR5","unstructured":"Bao F, Deng R, Nguyen KQ, Vardharajan V (1999) Multi-party fair exchange with an off-line trusted neutral party. In: DEXA\u201999 Workshop on Electronic Commerce and Security, Florence, Italy"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or M, Goldreich O, Micali S, Rivest RL (1990) A fair protocol for signing contracts. IEEE Trans Inf Theory 36(1):40\u201346","DOI":"10.1109\/18.50372"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Boyd C (1988) Some applications of multiple key ciphers. In: G\u00fcnther CG (ed) Advances in Cryptology \u2013 EUROCRYPT 88, Davos, Switzerland. Lecture Notes in Computer Science, vol 330. Springer, Berlin Heidelberg New York, pp 455\u2013467","DOI":"10.1007\/3-540-45961-8_40"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929\u2013934","DOI":"10.1109\/32.31350"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Franklin M, Tsudik G (1998) Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. Lecture Notes in Computer Science, vol 1465. Springer, Berlin Heidelberg New York","DOI":"10.1007\/BFb0055475"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Kremer S, Markowitch O (2000) A multi-party non-repudiation protocol. In: SEC 2000: 15th International Conference on Information Security, IFIP World Computer Congress, Beijing, China. Kluwer, pp 271\u2013280","DOI":"10.1007\/978-0-387-35515-3_28"},{"key":"19_CR11","unstructured":"Kremer S, Markowitch O (2000) Optimistic non-repudiable information exchange. In: Biemond J (ed) 21st Symp. on Information Theory in the Benelux, Wassenaar (NL), May 25\u201326. Werkgemeenschap Informatie \u2013 en Communicatietheorie, Enschede (NL), pp 139\u2013146"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Markowitch O, Kremer S (2000) A multi-party optimistic non-repudiation protocol. In: Won D (ed) Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC 2000), Seoul, Korea. Lecture Notes in Computer Science, vol 2015. Springer, Berlin Heidelberg New York, pp 109\u2013122","DOI":"10.1007\/3-540-45247-8_9"},{"key":"19_CR13","unstructured":"Markowitch O, Roggeman Y (1999) Probabilistic non-repudiation without trusted third party. In: Second Conference on Security in Communication Networks\u201999, Amalfi, Italy"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"You C, Zhou J, Lam K (1998) On the efficient implementation of fair non-repudiation. Comput Commun Rev 28(5):50\u201360","DOI":"10.1145\/303297.303305"},{"key":"19_CR15","unstructured":"Zhou J (1996) Non-repudiation. PhD thesis, University of London"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Zhou J, Deng R (2000) On the validity of digital signatures. Comput Commun Rev 30(2):29\u201334","DOI":"10.1145\/505680.505684"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Zhou J, Deng R, Bao F (1999) Evolution of fair non-repudiation with TTP. In: ACISP: Information Security and Privacy: Australasian Conference. Lecture Notes in Computer Science, vol 1587. Springer, Berlin Heidelberg New York, pp 258\u2013269","DOI":"10.1007\/3-540-48970-3_21"},{"key":"19_CR18","unstructured":"Zhou J, Gollmann D (1996) A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Security Press, pp 55\u201361"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Zhou J, Gollmann D (1997) An efficient non-repudiation protocol. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press","DOI":"10.1109\/CSFW.1997.596801"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Zhou J, Lam K (1999) Securing digital signatures for non-repudiation. Comput Commun 22(8):710\u2013716","DOI":"10.1016\/S0140-3664(99)00031-6"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0019-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0019-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0019-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0019-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T23:43:03Z","timestamp":1585352583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0019-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["19"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0019-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}