{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:51:29Z","timestamp":1729662689320,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194884","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"189-200","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic PKI and secure tuplespaces for distributed coalitions"],"prefix":"10.1109","author":[{"given":"T.J.","family":"Smith","sequence":"first","affiliation":[]},{"given":"G.T.","family":"Byrd","sequence":"additional","affiliation":[]},{"family":"Xiaoyong Wu","sequence":"additional","affiliation":[]},{"family":"Hongjie Xin","sequence":"additional","affiliation":[]},{"given":"K.","family":"Thangavelu","sequence":"additional","affiliation":[]},{"given":"R.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"A.","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"key":"ref12","first-page":"285","article-title":"User authentication and authorization in the Java platform","author":"lai","year":"1999","journal-title":"Computer Security Applications Conference 1999"},{"article-title":"GLOBE-Global Object Exchange","year":"1999","author":"larsen","key":"ref13"},{"year":"0","key":"ref14","article-title":"Legion of the Bouncy Castle"},{"key":"ref15","first-page":"43","article-title":"Experimenting with shared generation of RSA keys","author":"malkin","year":"1999","journal-title":"Proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (SNDSS)"},{"key":"ref16","article-title":"X.509 internet public key infrastructure online certificate status protocol - OCSP","author":"myers","year":"1999","journal-title":"IETF RFC 2560"},{"article-title":"Scalable distributed tuplespaces","year":"2001","author":"nemlekar","key":"ref17"},{"key":"ref18","article-title":"Spanish Inquisition","author":"seavey","year":"2002","journal-title":"Presentation at JavaOne"},{"key":"ref19","first-page":"207","article-title":"Practical threshold signatures","author":"shoup","year":"2000","journal-title":"Theory and Application of Cryptographic Techniques"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/BFb0052253","article-title":"Efficient generation of shared RSA keys","volume":"1233","author":"boneh","year":"1997","journal-title":"Crypto&#x2019; 97 Lecture Notes in Computer Sci-ence"},{"journal-title":"The Jini&#x2122; Specifications","year":"2000","author":"arnold","key":"ref3"},{"journal-title":"The version 1 0 RFC 2246 IETF","year":"1999","author":"dierks","key":"ref6"},{"key":"ref5","article-title":"Yalta: A secure collaborative space for dynamic coalitions","author":"byrd","year":"2001","journal-title":"IEEE 2nd SMC Information Assurance Workshop"},{"article-title":"The SSL protocol","year":"1996","author":"freier","key":"ref8"},{"journal-title":"JavaSpaces Princi-ples Patterns and Practice","year":"1999","author":"freeman","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2000.840945"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2363.2433"},{"key":"ref1","article-title":"Internet X.509 Public Key Infrastructure Certificate Management Protocols","author":"adams","year":"1999","journal-title":"RFC 2510 IETF"},{"year":"2001","key":"ref20"},{"year":"2002","key":"ref22","article-title":"How to implement a provider for the Java&#x2122; cryptography extension"},{"journal-title":"Reference","article-title":"Java&#x2122; cryptography architecture API specification","year":"2001","key":"ref21"},{"key":"ref24","first-page":"79","article-title":"Building intrusion tolerant applications","author":"wu","year":"1999","journal-title":"In Proceedings of the 8th USENIX Security Symposium"},{"key":"ref23","article-title":"SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Services","author":"wang","year":"2001","journal-title":"IEEE 2nd SMC Information Assurance Workshop"},{"key":"ref25","article-title":"COCA: A secure distributed on-line certification authority","author":"zhou","year":"2000","journal-title":"Technical Report 2000-1828"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194884.pdf?arnumber=1194884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:04:38Z","timestamp":1497571478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194884","relation":{},"subject":[]}}