{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T10:21:37Z","timestamp":1648894897902},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T00:00:00Z","timestamp":1263340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1007\/s11235-009-9254-x","type":"journal-article","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T15:54:58Z","timestamp":1263311698000},"page":"281-295","source":"Crossref","is-referenced-by-count":5,"title":["Geographic server distribution model for key revocation"],"prefix":"10.1007","volume":"44","author":[{"given":"Sudip","family":"Misra","sequence":"first","affiliation":[]},{"given":"Sumit","family":"Goswami","sequence":"additional","affiliation":[]},{"given":"Gyan Prakash","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Nirav","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,13]]},"reference":[{"issue":"6","key":"9254_CR1","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/JPROC.2004.827358","volume":"92","author":"U. Maurer","year":"2004","unstructured":"Maurer, U. (2004). New approaches to digital evidence. Proceedings of the IEEE, 92(6), 933\u2013947.","journal-title":"Proceedings of the IEEE"},{"key":"9254_CR2","unstructured":"The World Internet Security Company (2008). http:\/\/www1.wisekey.com\/products\/ . Last accessed 16th August (2008)."},{"key":"9254_CR3","unstructured":"The Controller of Certifying Authority (2008). http:\/\/www.cca.gov.in . Last accessed 21st August (2008)."},{"key":"9254_CR4","unstructured":"The National Informatics Centre (2008). Certifying Authority, http:\/\/nicca.nic.in\/index.jsp . Last accessed 21st August (2008)."},{"key":"9254_CR5","unstructured":"The Tata Consultancy Services (2008). Certifying Authority, http:\/\/www.tcs-ca.tcs.co.in . Last accessed 21st August (2008)."},{"issue":"8","key":"9254_CR6","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1109\/LCOMM.2005.1496607","volume":"9","author":"D. Hong","year":"2005","unstructured":"Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9(8), 759\u2013761.","journal-title":"IEEE Communications Letters"},{"key":"9254_CR7","series-title":"LNCS","first-page":"218","volume-title":"Proc. 1st European PKI workshop (EuroPKI 2004)","author":"G. Vanrenen","year":"2004","unstructured":"Vanrenen, G., & Smith, S. (2004). Distributing security-mediated PKI. In LNCS : Vol. 3093. Proc. 1st European PKI workshop (EuroPKI 2004) (pp. 218\u2013231). Berlin: Springer."},{"key":"9254_CR8","doi-asserted-by":"crossref","unstructured":"Wohlmacher, P. (2000). Digital certificates: a survey of revocation methods. In Proceedings of the 2000 ACM workshops on multimedia 2000 (pp.\u00a0111\u2013114). Los Angeles, California, United States.","DOI":"10.1145\/357744.357892"},{"key":"9254_CR9","series-title":"LNCS","volume-title":"Proc. Int. Conf. Financial Cryptography","author":"P. Kocher","year":"1998","unstructured":"Kocher, P. (1998). On certificate revocation and validation. In LNCS. Proc. Int. Conf. Financial Cryptography. Berlin: Springer."},{"issue":"2","key":"9254_CR10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/956981.956991","volume":"33","author":"P. Zheng","year":"2003","unstructured":"Zheng, P. (2003). Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review, 33(2), 103\u2013112.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"9254_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0055480","volume-title":"Proc. financial cryptography: second international conference, FC\u201998, British West Indies, 23\u201325 February 1998","author":"M. Myer","year":"1998","unstructured":"Myer, M. (1998). Revocation: options and challenges. In Lecture Notes in Computer Science. Proc. financial cryptography: second international conference, FC\u201998, British West Indies, 23\u201325 February 1998 (pp. 165\u2013171). Berlin: Springer."},{"issue":"3","key":"9254_CR12","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1049\/iet-ifs:20070045","volume":"1","author":"C. M. Lo","year":"2007","unstructured":"Lo, C. M., Hwang, T., & Li, C. M. (2007). Revocation-free public-key encryption based on security-mediated public-key infrastructure. IET Information Security, 1(3), 134\u2013141.","journal-title":"IET Information Security"},{"key":"9254_CR13","unstructured":"Boneh, D., Ding, X., Tsudik, G., & Wong, M. (2001). A method for fast revocation of public key certificates and security capabilities. In Proc. 10th USENIX security symposium (pp. 297\u2013308)."},{"key":"9254_CR14","series-title":"LNCS","first-page":"452","volume-title":"Advances in cryptology\u2014Asiacrypt\u20192003","author":"S. S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In LNCS : Vol. 2894. Advances in cryptology\u2014Asiacrypt\u20192003 (pp. 452\u2013473). Berlin: Springer."},{"key":"9254_CR15","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Proc. Eurocrypt 2003","author":"C. Gentry","year":"2003","unstructured":"Gentry, C. (2003). Certificate-based encryption and the certificate revocation problem. In LNCS : Vol. 2656. Proc. Eurocrypt 2003 (pp. 272\u2013293). Berlin: Springer."},{"key":"9254_CR16","unstructured":"Critchlow, D., & Zhang, N. (2004). Revocation invocation for accountable anonymous PKI certificate trees, computers and communications. In Proceedings of ISCC 2004, 28 June\u20131 July 2004 (Vol. 1, pp. 386\u2013392)."},{"key":"9254_CR17","unstructured":"Chow, S. S. M., Boyd, C., & Nieto, J. M. G. (2006). Security-mediated certificate-less cryptography. In Public key cryptography (pp. 508\u2013524)."},{"key":"9254_CR18","doi-asserted-by":"crossref","unstructured":"Cooper, D. (1999). A model of certificate revocation. In Proc. fifteenth annual computer security applications conf. (pp. 256\u2013264).","DOI":"10.1109\/CSAC.1999.816035"},{"key":"9254_CR19","doi-asserted-by":"crossref","unstructured":"Cooper, D. (2000). A more efficient use of delta-CRLs. In IEEE proceedings of the IEEE symposium on security and privacy (pp. 190\u2013202).","DOI":"10.1109\/SECPRI.2000.848456"},{"issue":"4","key":"9254_CR20","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/49.839932","volume":"18","author":"M. Naor","year":"2000","unstructured":"Naor, M., & Nissim, K. (2000). Certificate revocation and certificate update. IEEE Journal on Selected Areas in Communications, 18(4), 561\u2013570.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9254_CR21","unstructured":"McDaniel, P., & Jamin, S. (1998). Key distribution hierarchy. (Technical Report CSE-TR-366-98, EECS). University of Michigan, Ann Arbor."},{"issue":"3","key":"9254_CR22","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/TDSC.2005.28","volume":"2","author":"I. Z. Berta","year":"2005","unstructured":"Berta, I. Z., Buttya, L., & Vajda, I. (2005). A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE Transactions on Dependable and Secure Computing, 2(3), 268\u2013272.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9254_CR23","doi-asserted-by":"crossref","unstructured":"Dini, G., & Savino, I. M. (2006). An efficient key revocation protocol for wireless sensor networks. In Proceedings of the 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM\u201906) (pp. 3\u20135). Buffalo, New York, 26\u201329 June 2006.","DOI":"10.1109\/WOWMOM.2006.23"},{"key":"9254_CR24","unstructured":"Narten, T., Nordmark, E., & Simpson, W. (1998). Neighbour discovery for IP version 6. RFC 2461, December 1998."},{"key":"9254_CR25","doi-asserted-by":"crossref","unstructured":"Libert, B., & Quisquater, J. J. (2003). Efficient revocation and threshold pairing based cryptosystems. In Proc. symp. principles of distributed computing (PODC\u20192003) (pp. 163\u2013171).","DOI":"10.1145\/872035.872059"},{"issue":"6","key":"9254_CR26","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JPROC.2004.827355","volume":"92","author":"B. Pinkas","year":"2004","unstructured":"Pinkas, B. (2004). Efficient state updates for key management. Proceedings of the IEEE, 92(6), 910\u2013917.","journal-title":"Proceedings of the IEEE"},{"key":"9254_CR27","first-page":"196","volume-title":"Proceedings of computer security, dependability and assurance: from needs to solutions (CSDA\u201998)","author":"J. K. Millen","year":"1998","unstructured":"Millen, J. K., & Wright, R. N. (1998). Certificate revocation the responsible way. In Proceedings of computer security, dependability and assurance: from needs to solutions (CSDA\u201998) (pp. 196\u2013203). Los Alamitos: IEEE Comput. Soc."},{"key":"9254_CR28","doi-asserted-by":"crossref","unstructured":"Jeong, J., Lee, K., Park, J., Lee, H., & Kim, H. (2003). The auto configuration of recursive DNS server and the optimization of DNS name resolution in hierarchical mobile IPv6. In Proc. vehicular technology conference (VTC 2003), Fall 2003 (Vol. 5, pp. 3439\u20133442).","DOI":"10.1109\/VETECF.2003.1286347"},{"key":"9254_CR29","unstructured":"The OPNET IT Guru Academic Edition (2008). http:\/\/www.opnet.com\/university_program\/itguru_academic_edition\/ . Last accessed 21st August 2008."},{"key":"9254_CR30","unstructured":"Narten, T., Nordmark, E., & Simpson, W. (1998). Neighbour discovery for IP version 6. RFC 2461, December 1998."},{"issue":"5","key":"9254_CR31","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2007.4396941","volume":"14","author":"M. Shi","year":"2007","unstructured":"Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wireless Communications, 14(5), 38\u201346.","journal-title":"IEEE Wireless Communications"},{"issue":"9","key":"9254_CR32","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Clifford","year":"1994","unstructured":"Clifford, B., Neuman, O., & Theodore, T. (1994). Kerberos: an authentication service for computer networks. IEEE Communications, 32(9), 33\u201338.","journal-title":"IEEE Communications"},{"key":"9254_CR33","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007). OpenPGP message format. RFC 4880, November 2007.","DOI":"10.17487\/rfc4880"},{"key":"9254_CR34","unstructured":"Dierks, T., & Allen, C. (1999). The TLS protocol version 1.0. Request for comments: 2246, January 1999."},{"key":"9254_CR35","doi-asserted-by":"crossref","unstructured":"Hunter, B. (2002). Simplifying PKI usage through a client-server architecture and dynamic propagation of certificate paths and repository addresses. In Proceedings of 13th international workshop on database and expert systems applications (pp. 505\u2013510). University of Marseille, France, 2\u20136 Sept.","DOI":"10.1109\/DEXA.2002.1045948"},{"key":"9254_CR36","doi-asserted-by":"crossref","unstructured":"Finseth, C. (1993). An access control protocol, sometimes called TACACS. RFC1492, July 1993.","DOI":"10.17487\/rfc1492"},{"key":"9254_CR37","unstructured":"McDaniel, P., & Jamin, S. (2008) A key scalable distribution hierarchy. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.50.316 . Last accessed 21st August 2008."},{"key":"9254_CR38","unstructured":"Kent, S., & Atkinson, R. (1998). IP authentication header. Request for comments: 2402, November 1998."},{"key":"9254_CR39","doi-asserted-by":"crossref","unstructured":"Kent, S., & Atkinson, R. (1998). IP encapsulating security payload (ESP). RFC240, November 1998.","DOI":"10.17487\/rfc2406"},{"key":"9254_CR40","doi-asserted-by":"crossref","unstructured":"Shi, M., Shen, X.S., Yixin, J., & Lin, C. (2007). Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks. In IEEE Wireless Communications, October 2007 (pp. 38\u201346).","DOI":"10.1109\/MWC.2007.4396941"},{"key":"9254_CR41","doi-asserted-by":"crossref","unstructured":"Mealling, M. (2002). Dynamic delegation discovery system (DDDS): the domain name system (DNS) database. RFC 3403, October 2002.","DOI":"10.17487\/rfc3403"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9254-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-009-9254-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9254-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:50:08Z","timestamp":1559371808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-009-9254-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,13]]},"references-count":41,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["9254"],"URL":"https:\/\/doi.org\/10.1007\/s11235-009-9254-x","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,13]]}}}