{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:20:18Z","timestamp":1729639218033,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194973","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"246-251","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and scalable infrastructure support for dynamic coalitions"],"prefix":"10.1109","volume":"2","author":[{"given":"M.T.","family":"Goodrich","sequence":"first","affiliation":[]},{"given":"R.","family":"Tarnassia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Computational Geometry An Introduction","year":"1990","author":"preparata","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764805"},{"journal-title":"LEDA A Platform for Combinatorial and Geometric Computing","year":"2000","author":"mehlhorn","key":"ref33"},{"journal-title":"A general model for authentic data publication","year":"2001","author":"martel","key":"ref32"},{"key":"ref31","article-title":"Secure History Preservation Through Timeline Entanglement","author":"maniatis","year":"2002","journal-title":"Proc of the 11 th USENIX Security Symposium"},{"key":"ref30","article-title":"Enabling the Archival Storage of Signed Documents","author":"maniatis","year":"2002","journal-title":"Proc 2002 USENIX Conf File and Storage Technologies (FAST)"},{"key":"ref37","first-page":"217","article-title":"Certificate revocation and certificate update","author":"naor","year":"1998","journal-title":"Proc 7th USENIX Security Symposium"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7721(98)00036-4"},{"key":"ref10","first-page":"106","article-title":"Universal classes of hash functions","author":"carter","year":"1977","journal-title":"Proc ACM Symp on Theory of Computing"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/78973.78977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840440"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840441"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009160"},{"key":"ref14","article-title":"Flexible authentication of XML documents","author":"devanbu","year":"2001","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"ref15","article-title":"Authentic third-party data publication","author":"devanbu","year":"2000","journal-title":"Fourteenth IFIP 11 3 Conference on Database Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7721(98)00039-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-37623-2_6"},{"key":"ref18","first-page":"901s","article-title":"Checking priority queues","author":"finkler","year":"1999","journal-title":"Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_23"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055481","article-title":"On certificate revocation and validation","volume":"1465","author":"kocher","year":"1998","journal-title":"Proc 8th Int Financial Cryptography Conf"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/200836.200880"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60220-8_83"},{"key":"ref3","first-page":"47","article-title":"TRICERT: A distributed certified e-mail scheme","author":"ateniese","year":"2001","journal-title":"Symposium on Network and Distributed Systems Security (NDSS 97)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466960"},{"key":"ref29","article-title":"Certifying algorithms for recognizing interval and permutation graphs","author":"kratsh","year":"2003","journal-title":"Proc ACM-SIAM Symp on Discrete Algorithms"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315646"},{"key":"ref8","first-page":"9","article-title":"Accountable certificate management using undeniable attestations","author":"buldas","year":"2000","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466959"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167288"},{"key":"ref9","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","volume":"2002","author":"camenisch","year":"0","journal-title":"Proc Crypto"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/3-540-45439-X_26","article-title":"Persistent authenticated dictionaries and their applications","volume":"2200","author":"anagnostopoulos","year":"2001","journal-title":"Proc Information Security (ISC 2001)"},{"key":"ref20","article-title":"JSSH: A secure shell client","author":"goodrich","year":"2002","journal-title":"Technical Report"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195901000390"},{"key":"ref22","article-title":"Authenticated dictionaries for fresh attribute credentials","author":"goodrich","year":"2002","journal-title":"Technical Report"},{"key":"ref21","article-title":"LAIR: A lightweight authenticated information repository system","author":"goodrich","year":"2002","journal-title":"Technical Report"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146668"},{"key":"ref24","first-page":"372","article-title":"An efficient dynamic and distributed cryptographic accumulator","volume":"2433","author":"goodrich","year":"2002","journal-title":"Proc Int Security Conference (ISC 2002)"},{"key":"ref41","article-title":"Authenticating Web content with prooflets","author":"shin","year":"2002","journal-title":"Technical Report"},{"key":"ref23","article-title":"Efficient authenticated dictionaries with skip lists and commutative hashing","author":"goodrich","year":"2000","journal-title":"Technical Report"},{"key":"ref44","article-title":"JDSL: The data structures library in Java","volume":"323","author":"tamassia","year":"2001","journal-title":"Dr Dobb's Journal"},{"key":"ref26","article-title":"Authenticated data structures for graph and geometric searching","author":"goodrich","year":"2003","journal-title":"Proc CT-RSA"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/12.392843"},{"key":"ref25","first-page":"68","article-title":"Implementation of an authenticated dictionary with skip lists and commutative hashing","volume":"2","author":"goodrich","year":"2001","journal-title":"Proc 2001 DARPA Information Survivability Conf Expo"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194973.pdf?arnumber=1194973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:25:42Z","timestamp":1497587142000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194973","relation":{},"subject":[]}}