{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:45:20Z","timestamp":1725626720368},"reference-count":46,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176289","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T15:35:00Z","timestamp":1056641700000},"page":"172-182","source":"Crossref","is-referenced-by-count":1,"title":["A secure directory service based on exclusive encryption"],"prefix":"10.1109","author":[{"given":"J.R.","family":"Douceur","sequence":"first","affiliation":[]},{"given":"A.","family":"Adya","sequence":"additional","affiliation":[]},{"given":"J.","family":"Benaloh","sequence":"additional","affiliation":[]},{"given":"W.J.","family":"Bolosky","sequence":"additional","affiliation":[]},{"given":"G.","family":"Yuval","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref38","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data","author":"song","year":"2000","journal-title":"Symposium on Security and Privacy IEEE"},{"key":"ref33","first-page":"210","article-title":"All-Or-Nothing Encryption and The Package Transform","author":"rivest","year":"1997","journal-title":"Fast Software Encryption Conference 1997"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991551"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"journal-title":"FIPS Publications","article-title":"Data Encryption Standard Modes of Operation","year":"1980","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref36","article-title":"An overview of the Hasty Pudding Cipher","author":"schroeppel","year":"1998","journal-title":"AES Submission"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45518-3_18","article-title":"Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems","author":"rowstron","year":"2001","journal-title":"Middleware 2001"},{"key":"ref10","article-title":"Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography","author":"castro","year":"1999","journal-title":"MIT\/LCS Technical Memo"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266694"},{"key":"ref11","article-title":"A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm","author":"castro","year":"1999","journal-title":"Technical Memo MIT\/LCS\/TM-590"},{"key":"ref12","article-title":"Proactive Recovery in a Byzantine-Fault-Tolerant System","author":"castro","year":"2000","journal-title":"Proc 4th USENIX OSDI"},{"key":"ref13","article-title":"Freenet: A Distributed Anonymous Information Storage and Retrieval System","author":"clarke","year":"2000","journal-title":"Proc ICSI Workshop Design Issues in Anonymity and Unobservability"},{"journal-title":"Introduction to Algorithms","year":"1990","author":"cormen","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539794265232"},{"year":"0","key":"ref18"},{"key":"ref19","first-page":"63","article-title":"Implementation of the Ficus Replicated File System","author":"guy","year":"1990","journal-title":"USENIX '90"},{"journal-title":"Microsoft","article-title":"File Name Conventions","year":"2002","key":"ref28"},{"key":"ref4","first-page":"120","article-title":"Dense Probabilistic Encryption","author":"benaloh","year":"1994","journal-title":"Selected Areas Cryptography"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","article-title":"Two Practical and Provably Secure Block Ciphers: BEAR and LION","author":"anderson","year":"1996","journal-title":"Proc 3rd Fast Software Encryption Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168590"},{"journal-title":"FIPS Publication #46","year":"1977","key":"ref29"},{"key":"ref5","article-title":"Ciphers with Arbitrary Finite Domains","author":"black","year":"2002","journal-title":"RSA Data Security Conference Cryptographer's Track LNCS 1872"},{"key":"ref8","article-title":"Optimal Asynchronous Byzantine Agreement","author":"canneti","year":"1992","journal-title":"Technical Report #92&#x2013;15"},{"key":"ref7","first-page":"302","article-title":"Untraceable Off-Line Cash in Wallets with Observers","author":"brands","year":"1993","journal-title":"Crypto 93"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224066"},{"key":"ref9","first-page":"173","article-title":"Practical Byzantine Fault Tolerance","author":"castro","year":"1999","journal-title":"3rd OSDI USENIX"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"ref46","article-title":"COCA: A Secure Distributed On-line Certification Authority","author":"zhou","year":"2000","journal-title":"Technical Report 2000&#x2013;1828"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510755"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"journal-title":"Unicode Standard Annex #28 Unicode 3 2","article-title":"The Unicode Consortium","year":"2002","key":"ref42"},{"key":"ref24","first-page":"144","article-title":"BEAST: A Fast Block Cipher for Arbitrary Blocksizes","author":"lucks","year":"1996","journal-title":"Communications and Multimedia Security"},{"journal-title":"The Unicode Standard Version 2 0","article-title":"The Unicode Consortium","year":"2000","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref44","article-title":"UTF-8, a Transformation Format of ISO 10646","author":"yergeau","year":"1998","journal-title":"RFC 2279"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990070"},{"key":"ref43","first-page":"59","article-title":"Publius: A Robust, Tamper-Evident Censorship-Resistant Web Publishing System","author":"waldman","year":"2000","journal-title":"UCB Tech Report UCB\/CSD-01&#x2013;1141"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1998.740474"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176289.pdf?arnumber=1176289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T03:46:54Z","timestamp":1585021614000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176289","relation":{},"subject":[]}}