{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:46:20Z","timestamp":1730292380421,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/reldis.2003.1238086","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"339-348","source":"Crossref","is-referenced-by-count":1,"title":["The design and implementation of a JCA-compliant capture protection infrastructure"],"prefix":"10.1109","author":[{"given":"M.K.","family":"Reiter","sequence":"first","affiliation":[]},{"given":"A.","family":"Samar","sequence":"additional","affiliation":[]},{"family":"Chenxi Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/130069.130096"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1991.148689"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/58564.59295"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-003-0098-4"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"16"},{"key":"13","article-title":"Generic security service application program interface","volume":"2078","author":"linn","year":"1997","journal-title":"Internet RFC"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"11","first-page":"100","article-title":"Proactive public key and signature systems","author":"herzberg","year":"1997","journal-title":"Proc ACM Conf Comput Commun Sec"},{"journal-title":"Java Cryptography","year":"1998","author":"knudsen","key":"12"},{"key":"21","article-title":"A mutual exclusion algorithm for ad hoc mobile networks","author":"walter","year":"1998","journal-title":"Proc 2nd Int Work Disc Algor & Method Mob Comput & Commun"},{"key":"3","first-page":"297","article-title":"A method for fast revocation of public key certificates and security capabilities","author":"boneh","year":"2001","journal-title":"Proc 10th Usenix Security Symp"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"2","first-page":"18","article-title":"The proactive security toolkit and applications","author":"barak","year":"1999","journal-title":"Proc ACM Conf Comput Commun Sec"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/103727.103728"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1995.390639"},{"key":"7","first-page":"119","article-title":"The Arrow distributed directory protocol","author":"demmer","year":"1998","journal-title":"Proc 21st Int Symp Distrib Comput"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/570811.570815"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1990.93960"},{"key":"4","article-title":"A distributed mutual exclusion algorithm for mobile ad-hoc net works","author":"baldoni","year":"2002","journal-title":"Proc Int Symp Computers Communications"},{"key":"9","article-title":"Experimenting with server-aided signatures","author":"ding","year":"2002","journal-title":"Proc 2002 Netw & Distrib Syst Secur Symp"},{"journal-title":"Cooperating sequential processes","year":"1965","author":"dijkstra","key":"8"}],"event":{"name":"22nd International Symposium on Reliable Distributed Systems","acronym":"RELDIS-03","location":"Florence, Italy"},"container-title":["22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8774\/27777\/01238086.pdf?arnumber=1238086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:02:11Z","timestamp":1489428131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/reldis.2003.1238086","relation":{},"subject":[]}}