{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:25:26Z","timestamp":1762003526549},"reference-count":29,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1016\/s0140-3664(99)00031-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:56:11Z","timestamp":1027637771000},"page":"710-716","source":"Crossref","is-referenced-by-count":33,"title":["Securing digital signatures for non-repudiation"],"prefix":"10.1016","volume":"22","author":[{"given":"J.","family":"Zhou","sequence":"first","affiliation":[]},{"given":"K.Y.","family":"Lam","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(99)00031-6_BIB1","unstructured":"M. Roe, Cryptography and evidence. PhD Thesis, University of Cambridge, 1997."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB2","unstructured":"J. Zhou, Non-repudiation, PhD Thesis, University of London, December 1996."},{"issue":"3","key":"10.1016\/S0140-3664(99)00031-6_BIB3","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1006\/jnca.1997.0056","article-title":"Evidence and non-repudiation","volume":"20","author":"Zhou","year":"1997","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB4","unstructured":"ISO\/IEC 10181-4. Information technology\u2014open systems interconnection\u2014security frameworks for open systems, Part 4: Non-repudiation framework, ISO\/IEC, 1997."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB5","unstructured":"ISO\/IEC 13888-1. Information technology\u2014security techniques\u2014non-repudiation, Part 1: General. ISO\/IEC, 1997."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB6","unstructured":"ISO\/IEC 13888-2. Information technology\u2014security techniques\u2014non-repudiation, Part 2: Mechanisms using symmetric techniques, ISO\/IEC, 1998."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB7","unstructured":"ISO\/IEC 13888-3. Information technology\u2014security techniques\u2014non-repudiation, Part 3: Mechanisms using asymmetric techniques, ISO\/IEC, 1997."},{"issue":"3","key":"10.1016\/S0140-3664(99)00031-6_BIB8","first-page":"44","article-title":"Legal recognition of digital signatures","volume":"16","author":"Hollaar","year":"1996","journal-title":"IEEE Micro"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB9","unstructured":"ISO\/IEC DIS 9798-3. Information technology\u2014security techniques\u2014entity authentication, Part 3: Mechanisms using digital signature techniques (second edition), ISO\/IEC, 1998."},{"issue":"2","key":"10.1016\/S0140-3664(99)00031-6_BIB10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MC.1983.1654294","article-title":"Digital signatures: a tutorial survey","volume":"16","author":"Akl","year":"1983","journal-title":"Computer"},{"issue":"11","key":"10.1016\/S0140-3664(99)00031-6_BIB11","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1145\/358790.358798","article-title":"Authentication of signatures using public key encryption","volume":"24","author":"Booth","year":"1981","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/S0140-3664(99)00031-6_BIB12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MC.1983.1654298","article-title":"Protocols for data security","volume":"16","author":"DeMillo","year":"1983","journal-title":"Computer"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB13","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1996"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB14","series-title":"Applied cryptography-Protocols, algorithms, and source code in C","author":"Schneier","year":"1996"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB15","doi-asserted-by":"crossref","unstructured":"K.Y. Lam, D. Gollmann, Freshness assurance of authentication protocols, in: Lecture Notes in Computer Science 648, Computer Security: Proceedings of ESORICS\u201992, Toulouse, France, November 1992, pp. 261\u2013271.","DOI":"10.1007\/BFb0013902"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB16","doi-asserted-by":"crossref","unstructured":"K.Y. Lam, T. Beth, Timely authentication in distributed systems, in: Lecture Notes in Computer Science 648, Computer Security: Proceedings of ESORICS\u201992, Toulouse, France, November 1992, pp. 293\u2013303.","DOI":"10.1007\/BFb0013904"},{"issue":"1","key":"10.1016\/S0140-3664(99)00031-6_BIB17","first-page":"73","article-title":"Building an authentication service for distributed systems","volume":"2","author":"Lam","year":"1993","journal-title":"Journal of Computer Security"},{"issue":"2","key":"10.1016\/S0140-3664(99)00031-6_BIB18","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","article-title":"How to time-stamp a digital document","volume":"3","author":"Haber","year":"1991","journal-title":"Journal of Cryptology"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB19","unstructured":"ISO\/IEC 9796. Information technology\u2014security techniques\u2014digital signature scheme giving message recovery, ISO\/IEC, 1991."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB20","unstructured":"NIST FIPS PUB 186, Digital signature standard, National Institute of Standards and Technology, May 1994."},{"key":"10.1016\/S0140-3664(99)00031-6_BIB21","doi-asserted-by":"crossref","unstructured":"A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive public key and signature systems, in: Proceedings of Fourth ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 100\u2013110.","DOI":"10.1145\/266420.266442"},{"issue":"1","key":"10.1016\/S0140-3664(99)00031-6_BIB22","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/232335.232338","article-title":"Non-repudiation with mandatory proof of receipt","volume":"26","author":"Coffey","year":"1996","journal-title":"Computer Communication Review"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB23","unstructured":"B. Cox, J.D. Tygar, M. Sirbu, NetBill security and transaction protocol, in: Proceedings of the First USENIX Workshop on Electronic Commerce, July 1995, pp. 77\u201378."},{"issue":"3","key":"10.1016\/S0140-3664(99)00031-6_BIB24","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF02139147","article-title":"Practical protocols for certified electronic mail","volume":"4","author":"Deng","year":"1996","journal-title":"Journal of Network and Systems Management"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB25","doi-asserted-by":"crossref","unstructured":"J. Zhou, D. Gollmann. A fair non-repudiation protocol, in: Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, California, May 1996, pp. 55\u201361.","DOI":"10.1109\/SECPRI.1996.502669"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB26","unstructured":"C.J. Mitchell, Private communications, May 1998."},{"issue":"2","key":"10.1016\/S0140-3664(99)00031-6_BIB27","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/4236.670687","article-title":"An Intranet security framework based on short-lived certificates","volume":"2","author":"Hsu","year":"1998","journal-title":"IEEE Internet Computing"},{"issue":"11","key":"10.1016\/S0140-3664(99)00031-6_BIB28","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(99)00031-6_BIB29","doi-asserted-by":"crossref","unstructured":"T.P. Pedersen, Electronic payments of small amounts, in: Lecture Notes in Computer Science 1189, Proceedings of Cambridge Workshop on Security Protocols, Cambridge, April 1996, pp. 59\u201368.","DOI":"10.1007\/3-540-62494-5_5"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499000316?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499000316?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T22:29:04Z","timestamp":1555194544000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366499000316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1999,5]]}},"alternative-id":["S0140366499000316"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(99)00031-6","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1999,5]]}}}