{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:59:07Z","timestamp":1648936747564},"reference-count":21,"publisher":"Elsevier BV","issue":"16","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s0140-3664(03)00078-1","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"1826-1838","source":"Crossref","is-referenced-by-count":7,"title":["Virtual certificates and synthetic certificates: new paradigms for improving public key validation"],"prefix":"10.1016","volume":"26","author":[{"given":"Selwyn","family":"Russell","sequence":"first","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(03)00078-1_BIB1","doi-asserted-by":"crossref","unstructured":"C. Adams, S. Farrell, RFC 2510: Internet X.509 Public Key Infrastructure Certificate Management Protocols, March 1999.","DOI":"10.17487\/rfc2510"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB2","doi-asserted-by":"crossref","unstructured":"P. Alterman, The US Federal PKI and the Federal Bridge Certification Authority, 7 May 2001.","DOI":"10.1016\/S1389-1286(01)00244-4"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB3","series-title":"Breaking One Million DES Keys","author":"Desmedt","year":"1998"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB4","doi-asserted-by":"crossref","unstructured":"D. Balenson, RFC 1423: privacy enhancement for Internet electronic mail: part III: algorithms, modes, and identifiers, Trusted Information Systems, Glenwood, Maryland, USA, February, 1993.","DOI":"10.17487\/rfc1423"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB5","unstructured":"CCITT, The Directory\u2014Authentication Framework, Number CCITT X.509, International Telegraph and Telephone Consultative Committee, Switzerland, November, 1988."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB6","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, RFC 2246: The TLS Protocol Version 1.0, January 1999, RFC 2246.","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB7","unstructured":"FPKI FBCA, Report of Federal Bridge Certification Authority Initiative and Demonstration (Electronic Messaging Association Challenge 2000), 2000."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB8","unstructured":"ITU-T, Recommendation X.509: Information technology\u2014Open Systems Interconnection\u2014The Directory: Public-key and attribute certificate frameworks, March 2000. http:\/\/www.itu.int\/rec\/recommendation.asp?type=folders&lang=e-&parent=T-REC-X.509."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB9","doi-asserted-by":"crossref","unstructured":"B. Kaliski, RFC 1424: Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, RSA Laboratories, February 1993.","DOI":"10.17487\/rfc1424"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB10","doi-asserted-by":"crossref","unstructured":"S.T. Kent, RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-based Key Management, BBN, February 1993.","DOI":"10.17487\/rfc1422"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB11","unstructured":"H. Kim, Y. Cho, S. Jin, K. Chung, Current Status and Trends of PKI in Korea, in: K. Kim (Ed.), Proceedings of the First International Workshop for Asian PKI, ICU, Daejeon, Korea, 19\u201320 October 2001, International Research Center for Information Security, Korea and Institute of Industrial Science, Japan, pp. 1\u201321."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB12","doi-asserted-by":"crossref","unstructured":"J. Linn, RFC 1421, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, February 1993.","DOI":"10.17487\/rfc1421"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB13","unstructured":"A. Malpani, R. Housley, T. Freeman, Simple Certificate Validation Protocol (SCVP), March 2002, draft-ietf-pkix-scvp-08.txt."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB14","unstructured":"R. Moskowitz, PKI at a Crossroads, Networkcomputing.com, 1 May 2001, http:\/\/www.networkcomputing.com\/1108\/1108colmoskowitz.html."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB15","doi-asserted-by":"crossref","unstructured":"M. Myeres, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol\u2014OCSP, June 1999.","DOI":"10.17487\/rfc2560"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB16","unstructured":"Office of Government Information Technology, Gatekeeper, a strategy for public key technology use in the Government, online, 6 May 1998, http:\/\/www.govonline.gov.au\/-publications\/GatekeeperStrategy.pdf."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB17","unstructured":"Office of Government Information Technology, Gatekeeper Accreditation Certificate, on-line, 2000, http:\/\/www.govonline.gov.au\/projects\/publickey\/gac.htm."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB18","unstructured":"W.T. Polk, N.E. Hastings, Bridging certification authorities: connecting B2B public key infrastructures, Role of Federal Bridge CA, September 2000."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB19","doi-asserted-by":"crossref","unstructured":"S. Russell, Fast checking of individual certificate revocation on small systems, in: J. Epstein (Ed.), Fifteenth Annual Computer Security Applications Conference, Radisson Resort Scottsdale, Phoenix, Arizona, 6\u201310 December 1999, Annual Computer Security Applications Conference, http:\/\/www.acsac.org\/1999\/papers\/thu-a-1300-russell.pdf.","DOI":"10.1109\/CSAC.1999.816034"},{"key":"10.1016\/S0140-3664(03)00078-1_BIB20","unstructured":"Thawte, The Cross-Certification and Chained Certificate Authority Program, Accessed 5th November 2001, http:\/\/www.thawte.com\/certs\/chained\/whitepaper.html."},{"key":"10.1016\/S0140-3664(03)00078-1_BIB21","unstructured":"WiseKey, The World Internet Security Company, Accessed 5th November 2001, http:\/\/-www.wisekey.com\/wisekey\/commonroot.htm."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000781?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000781?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T22:59:22Z","timestamp":1584485962000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366403000781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":21,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S0140366403000781"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(03)00078-1","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}