{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:52:55Z","timestamp":1730217175079,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/eee.2004.1287323","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"277-284","source":"Crossref","is-referenced-by-count":2,"title":["An analysis of detailed electronic time-stamping using digital TV"],"prefix":"10.1109","author":[{"family":"Tsutomu Morigaki","sequence":"first","affiliation":[]},{"family":"Kanta Matsuura","sequence":"additional","affiliation":[]},{"family":"Osamu Sudo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Present situation and problems of digital time-stamping technology","author":"une","year":"1999","journal-title":"IMES Discussion Paper Series No 99-J-36"},{"key":"2","article-title":"Minimizing bandwidth for remote access to cryptographically protected audit logs","author":"kelsey","year":"1999","journal-title":"Second International Workshop on the Recent Advances in Intrusion Detection (RAID'99)"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/317087.317089"},{"key":"1","first-page":"53","article-title":"Cryptographic support for secure logs on untrusted machine","author":"schneier","year":"1998","journal-title":"Proc of the 7th USENIX Security Symposium"},{"year":"1999","author":"lipmma","journal-title":"Digital Signatures and Authentication","key":"7"},{"year":"0","author":"yagi","journal-title":"The Technology of Data Broadcasting","key":"6"},{"key":"5","first-page":"1","article-title":"An analysis of ensuring order of log entries in distributed environment","volume":"2002","author":"ando","year":"2002","journal-title":"Computer Security Symposium (CSS) 2002"},{"key":"4","first-page":"621","article-title":"A new time-stamping scheme resistant to malicious issuers","volume":"2","author":"yamada","year":"2002","journal-title":"The 2002 Symposium on Cryptography and Information Security (SCIS2002)"},{"key":"9","article-title":"Digital security tokens and their derivatives","author":"matuura","year":"2001","journal-title":"7th International Conference of the Society for Computational Economics (SCE'01)"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/IEMC.2002.1038554"},{"year":"1996","author":"schneier","journal-title":"Applied Cryptography Prceeds Algorithms and Serve Code in C John Wilkey & Sons Inc 2nd Edition","key":"11"}],"event":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","start":{"date-parts":[[2004,3,31]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2004,3,31]]}},"container-title":["IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9045\/28698\/01287323.pdf?arnumber=1287323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T17:14:30Z","timestamp":1489511670000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1287323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/eee.2004.1287323","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}