{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:11:21Z","timestamp":1649178681861},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/s10207-003-0027-3","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T13:07:00Z","timestamp":1075381620000},"page":"91-102","source":"Crossref","is-referenced-by-count":3,"title":["PKI design based on the use of on-line certification authorities"],"prefix":"10.1007","volume":"2","author":[{"given":"Javier","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Jose A.","family":"Montenegro","sequence":"additional","affiliation":[]},{"given":"Juan J.","family":"Ortega","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,1,1]]},"reference":[{"key":"27_CR1","first-page":"building","volume":"commerce","author":"Ford","year":"2000","unstructured":"Ford W, Baum M (2000) Secure electronic commerce: building the infrastructure for digital signatures and encryption, 2nd ed. Prentice-Hall, New York","journal-title":"Secure electronic"},{"key":"27_CR2","unstructured":"Kohl J (1989) The use of encryption in kerberos for network authentication. In: Advances in Cryptology \u2013 CRYPTO\u201989. Springer, Berlin Heidelberg New York, pp 35\u201343"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Kohl J, Neuman BC (1993) The Kerberos network authentication service (V5). Internet request for comment 1510","DOI":"10.17487\/rfc1510"},{"key":"27_CR4","unstructured":"Davis D (1995) Kerberos plus RSA for World Wide Web security. First USENIX Workshop on Electronic Commerce, pp 185\u2013188"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Ganesan R (1995) Yaksha: augmenting Kerberos with public key cryptography. Internet Society Symposium on Network and Distributed Systems Security, pp 132\u2013143","DOI":"10.1109\/NDSS.1995.390639"},{"key":"27_CR6","first-page":"combining","volume":"trust","author":"Schiller","year":"1995","unstructured":"Schiller J, Atkins D (1995) Scaling the web of trust: combining Kerberos and PGP to provide large scale authentication. USENIX Technical Conference","journal-title":"Scaling the web of"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1108\/09593849410076799","volume":"7","author":"Clarke","year":"1997","unstructured":"Clarke R (1997) Human identification in information systems: management challenges and public policy issues. Inf Technol People 7(4):6\u201337","journal-title":"Inf Technol People"},{"key":"27_CR9","unstructured":"Garfinkel S, Spafford E (2001) Web security and commerce, 2nd Ed. O\u2019Reilly & Associates"},{"key":"27_CR10","unstructured":"European Commission (December 1999) Directive 1999\/93 of the European parliament and the council on a community framework for electronic signatures. Official Journal L 013, 19\/01\/2000, pp 0012\u20130020"},{"key":"27_CR11","first-page":"signing","volume":"ceremonial","author":"Wright","year":"1998","unstructured":"Wright B (1998) Making numbers ceremonial: signing tax returns with personal identification numbers. Personal communication","journal-title":"Making numbers"},{"key":"27_CR12","unstructured":"Detweiler L (1993) Identity, privacy and anonymity on the Internet. http:\/\/www.rewi.hu-berlin.de\/jura\/proj\/dsi\/Netze\/privint.html"},{"key":"27_CR13","unstructured":"ISO International Standard 9594 (1988) Information technology \u2013 open systems interconnection reference model: the directory"},{"key":"27_CR14","unstructured":"International Telecommunication Union (1997) ITU-T Recommendation X.509, Information technology \u2013 open systems interconnection \u2013 The directory: authentication framework"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Lopez J, Ma\u00f1a A, Ortega JJ, Troya JM (2000) Distributed storage and revocation in digital certificate databases. In: 11th International Conference on Database and Expert Systems Applications (DEXA\u201900). LNCS 1873. Springer, Berlin Heidelberg New York, pp 930\u2013938","DOI":"10.1007\/3-540-44469-6_87"},{"key":"27_CR16","unstructured":"International Telecommunication Union (2000) ITU-T recommendation X.509, Information technology \u2013 open systems interconnection \u2013 The directory: public-key and attribute certificate frameworks"},{"key":"27_CR17","unstructured":"Myers M, Ankney R, Malpani A, Galperin S, Adams C (1999) X.509 internet public key infrastructure. Online certificate status protocol \u2013 OCSP, Internet request for comment 2560"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Rivest R (1998) Can we eliminate revocation lists? In: Hirschfeld R (ed) Financial Cryptography. Second International Conference, FC\u201998, Anguilla, British West Indies, 23\u201325 February 1998. LNCS vol. 1465. Springer, Berlin Heidelberg New York, pp 178\u2013183","DOI":"10.1007\/BFb0055482"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Eastlake D (March 1999) Domain name system security extensions. Internet request for comment 2535","DOI":"10.17487\/rfc2535"},{"key":"27_CR20","unstructured":"Lopez J, Ma\u00f1a A, Montenegro JA, Ortega JJ, Troya JM (June 2002) Designing software tools for the use of secure electronic forms. 3rd ACIS Int. Conf. on Software Engineering, Artificial Intelligence Networking and Parallel\/Distributed Computing (SNPD\u201902), pp 157\u2013163"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Mockapetris P (November 1987) Domain names \u2013 concepts and facilities. Internet request for comments 1034","DOI":"10.17487\/rfc1034"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Hodges J, Morgan R (September 2002) Lightweight directory access protocol (v3): technical specification. Internet request for comment 3377","DOI":"10.17487\/rfc3377"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0027-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0027-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0027-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:37:55Z","timestamp":1585485475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0027-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0027-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}