{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:40:43Z","timestamp":1729676443818,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/isads.2009.5207327","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T11:09:10Z","timestamp":1251112150000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A uniqueness verifying Public Key Infrastructure based on Autonomous Decentralized System architecture"],"prefix":"10.1109","author":[{"given":"Luis Carlos","family":"Coronado-Garcia","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Hernandez-Lopez","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Perez-Leguizamo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.1993.262725"},{"key":"10","first-page":"1056","article-title":"autonomous decentralized software structure and its application","author":"mori","year":"1986","journal-title":"Fall Joint Computer Conference (FJCC'86)"},{"journal-title":"Understanding Public-Key Infrastructure Concepts Standards and Deployment Considerations","year":"1999","author":"carlisle adams","key":"1"},{"journal-title":"UNCITRAL Model Law on Electronic Signatures with Guide to Enactment","year":"2001","key":"7"},{"journal-title":"Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","year":"2008","author":"santesson","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"a method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"shamir","year":"1978","journal-title":"Communications of the ACM"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"paul","key":"4"},{"journal-title":"8th International Symposium on Autonomous Decentralized Systems (ISADS '07)","year":"2007","key":"9"},{"journal-title":"International Symposium on Autonomous Decentralized Systems ISADS '05","year":"2005","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.1999.780815"}],"event":{"name":"2009 International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2009,3,23]]},"location":"Athens, Greece","end":{"date-parts":[[2009,3,25]]}},"container-title":["2009 International Symposium on Autonomous Decentralized Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5185482\/5207317\/05207327.pdf?arnumber=5207327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:05:20Z","timestamp":1497812720000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5207327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/isads.2009.5207327","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}