{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T11:44:49Z","timestamp":1648727089263},"reference-count":7,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2000,10,1]],"date-time":"2000-10-01T00:00:00Z","timestamp":970358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2000,10]]},"DOI":"10.1016\/s0167-4048(00)06029-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T13:17:04Z","timestamp":1027603024000},"page":"551-558","source":"Crossref","is-referenced-by-count":0,"title":["Ticket and Challenge-Based Protocols for Timestamping"],"prefix":"10.1016","volume":"19","author":[{"given":"Mohammad","family":"Peyravian","sequence":"first","affiliation":[]},{"given":"Stephen M","family":"Matyas","sequence":"additional","affiliation":[]},{"given":"Allen","family":"Roginsky","sequence":"additional","affiliation":[]},{"given":"Nevenko","family":"Zunic","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(00)06029-6_BIB1","unstructured":"B. Schneier, Applied Cryptography (second edition), John Wiley & Sons, Inc., 1996, pp. 75\u201378."},{"key":"10.1016\/S0167-4048(00)06029-6_BIB2","doi-asserted-by":"crossref","unstructured":"D. Bayer, S. Haber, and W.S. Stornetta, \u201cImproving the Efficiency and Reliability of Digital Time-Stamping\u201d, Sequences \u201991: Methods in Communication, Security and Computer Science, Springer-Verlag, 1992, pp. 329\u2013334.","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"10.1016\/S0167-4048(00)06029-6_BIB3","unstructured":"A. M. Fischer, \u201cPublic\/Key Date-Time Notary Facility\u201d, U.S. Patent 5,001,752, issued March 19, 1991."},{"key":"10.1016\/S0167-4048(00)06029-6_BIB4","unstructured":"S. A. Haber and W. S. Stornetta, Jr., \u201cMethod for secure time-stamping of digital documents\u201d, U. S. Patent 5,136,647, issued August 4, 1992."},{"key":"10.1016\/S0167-4048(00)06029-6_BIB5","unstructured":"S. A. Haber and W. S. Stornetta, Jr., \u201cDigital document time-stamping with catenate certificate\u201d, U. S. Patent 5,136,646, issued August 4, 1992."},{"key":"10.1016\/S0167-4048(00)06029-6_BIB6","unstructured":"S. A. Haber and W. S. Stornetta, Jr., \u201cMethod for secure time-stamping of digital documents\u201d, U. S. Patent Re. 34,954, issued May 30, 1995."},{"key":"10.1016\/S0167-4048(00)06029-6_BIB7","unstructured":"S. A. Haber and W. S. Stornetta, Jr., \u201cMethod of extending the validity of a cryptographic certificate\u201d, U. S. Patent 5,373,561, issued December 13, 1994."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800060296?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800060296?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T22:22:10Z","timestamp":1578867730000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404800060296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,10]]},"references-count":7,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2000,10]]}},"alternative-id":["S0167404800060296"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(00)06029-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2000,10]]}}}