{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T23:29:30Z","timestamp":1673479770483},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/s10207-003-0029-1","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T13:07:00Z","timestamp":1075381620000},"page":"66-77","source":"Crossref","is-referenced-by-count":1,"title":["All sail, no anchor II: Acceptable high-end PKI"],"prefix":"10.1007","volume":"2","author":[{"given":"B.","family":"Blakley","sequence":"first","affiliation":[]},{"given":"G.R.","family":"Blakley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,1,1]]},"reference":[{"key":"29_CRBL78","unstructured":"Blakley B, Blakley GR (1978) Security of public key cryptosystems against random attack. Part 1, Cryptologia 2(4):305\u2013321, Part 2, Cryptologia 3(1):29\u201342, Part 3, Cryptologia 3(2):205\u2013118"},{"key":"29_CRBL00","doi-asserted-by":"crossref","unstructured":"Blakley B, Blakley GR (2000) All sail, no anchor, I: Cryptography, Risk, and e-Commerce. In: Dawson E, Clark A, Boyd C (eds) Information security and privacy, Proceedings, ACISP 2000. Lecture notes in computer science, vol 1841. Springer, Berlin Heidelberg New York, pp 471\u2013476","DOI":"10.1007\/10718964_38"},{"key":"29_CRBR90","doi-asserted-by":"crossref","unstructured":"Brickell EF (1990) A survey of hardware implementations of RSA In: Brassard G (ed) Advances in cryptology: Crypto 89. Lecture notes in computer science, vol 435. Springer, Berlin Heidelberg New York, pp 368\u2013370","DOI":"10.1007\/0-387-34805-0_34"},{"key":"29_CRDA82","unstructured":"Davida GI (1982) Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wiusconsin, Milwaukee, WI"},{"key":"29_CRDA80","unstructured":"Davies DW, Price, WL (1980) The application of digital signatures based on public-key cryptosystems. Proceedings of the 5th International Computer Communications Conference, October 1980, pp 530\u2013535"},{"key":"29_CRDE83","unstructured":"Denning DER (1983) Cryptography and data security. Addison-Wesley, Reading, MA"},{"key":"29_CRDI76","doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory IT-22, pp 644\u2013654","DOI":"10.1109\/TIT.1976.1055638"},{"key":"29_CRHA03","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/777313.777319","volume":"44","author":"Hart","year":"2003","unstructured":"Hart PE, Liu Z (2003) Trust in the preservation of digital information. Communications of the ACM 44(6):93\u201397","journal-title":"Communications of the ACM"},{"key":"29_CRMC01","unstructured":"McCullagh AJ (2001) The incorporation of trust strategies in digital signature regimes. PhD thesis, ISRC, Queensland University of Technology, Australia"},{"key":"29_CRRI78","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21:120\u2013126","journal-title":"Communications of the ACM"},{"key":"29_CRRI91","doi-asserted-by":"crossref","unstructured":"Rivest RL (1991) The MD4 message digest algorithm. In: Menezes AJ, Vanstone SA (eds) Advances in cryptology: Crypto 90. Lecture notes in computer science, vol 537. Springer, Berlin Heidelberg New York, pp 303\u2013311","DOI":"10.1007\/3-540-38424-3_22"},{"key":"29_CRST03","doi-asserted-by":"crossref","unstructured":"Shamir A, Tromer E (2003) Factoring large numbers with the TWIRL device. In: Boneh D (ed) Advances in cryptology: Crypto 03. Lecture notes in computer science, vol 2729. Springer, Berlin Heidelberg New York, pp 1\u201326","DOI":"10.1007\/978-3-540-45146-4_1"},{"key":"29_CRST02","unstructured":"Stinson DR (2002) Cryptography: Theory and practice, 2nd ed. Chapman & Hall\/CRC, Boca Raton, Florida"},{"key":"29_CRWI03","unstructured":"Wildstrom SH (2003) Technology & you, just click on the dotted line. Business Week, 2 June 2003, p 18"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0029-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0029-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0029-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:21Z","timestamp":1559127681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0029-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["29"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0029-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}