{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:29Z","timestamp":1750308929248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036927","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"53-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ARECA"],"prefix":"10.1145","author":[{"given":"Jiwu","family":"Jing","sequence":"first","affiliation":[{"name":"Graduate School of CAS, China"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, PA"}]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[{"name":"Institute Of Software, China"}]},{"given":"Ji","family":"Xiang","sequence":"additional","affiliation":[{"name":"Graduate School of Chinese Academy of Sciences, China"}]},{"given":"Neng","family":"Gao","sequence":"additional","affiliation":[{"name":"Graduate School of Chinese Academy of Sciences, China"}]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Graduate School of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"384","volume-title":"Proc IEEE Symposium on Foundations of Computer Science","author":"Frankel Yair","year":"1997","unstructured":"Yair Frankel , Peter Gemmell , Philip D. MacKenzie , Moti Yung , \" Optimal-Resilience Proactive Public-Key Cryptosystems\" , Proc IEEE Symposium on Foundations of Computer Science , Miami Beach, Florida , 1997 : 384 - 393 Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung, \"Optimal-Resilience Proactive Public-Key Cryptosystems\", Proc IEEE Symposium on Foundations of Computer Science, Miami Beach, Florida, 1997:384-393"},{"key":"e_1_3_2_1_2_1","first-page":"79","volume-title":"Proc USENIX Security Symposium","author":"Wu T.","year":"1999","unstructured":"T. Wu , M. Malkin , D. Boneh , \" Building Intrusion Tolerant Applications\" , In Proc USENIX Security Symposium , Aug 1999 , pages 79 - 91 . T. Wu, M. Malkin, D. Boneh, \"Building Intrusion Tolerant Applications\", In Proc USENIX Security Symposium, Aug 1999, pages 79-91."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc Enrocrypt","author":"Shoup V.","year":"2000","unstructured":"V. Shoup , \" Practical Threshold Signatures\" , in Proc Enrocrypt 2000 , Belgium, pages 207-220 V. Shoup, \"Practical Threshold Signatures\", in Proc Enrocrypt 2000, Belgium, pages 207-220"},{"key":"e_1_3_2_1_4_1","volume-title":"CryptoBytes, a technical newsletter of RSA","volume":"2","author":"Gemmell P. S.","year":"1977","unstructured":"P. S. Gemmell , \" An Introduction to Threshold Cryptography\" , in CryptoBytes, a technical newsletter of RSA , 1977 , Vol. 2 , No 7: 7-12 P. S. Gemmell, \"An Introduction to Threshold Cryptography\", in CryptoBytes, a technical newsletter of RSA, 1977, Vol. 2, No 7:7-12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/571637.571638"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","first-page":"233","volume-title":"Advances in Cryptology-Asiacrypt","author":"Boneh D.","year":"1998","unstructured":"D. Boneh , G. Durfee , and Y. Frankel , \" Exposing an RSA Private Key Given a Small Fraction of its Bits \", In K. Ohta and D. Pei, editors, Advances in Cryptology-Asiacrypt 1998 , number 1514 in Lecture Notes in Computer Science , pages 233 - 260 . Springer Verlag , 1998 D. Boneh, G. Durfee, and Y. Frankel, \"Exposing an RSA Private Key Given a Small Fraction of its Bits\", In K. Ohta and D. Pei, editors, Advances in Cryptology-Asiacrypt 1998, number 1514 in Lecture Notes in Computer Science, pages 233-260. Springer Verlag, 1998"},{"issue":"8","key":"e_1_3_2_1_8_1","first-page":"1417","article-title":"An Intrusion tolerant CA scheme","volume":"13","author":"Jing Jiwu","year":"2002","unstructured":"Jiwu Jing , Dengguo Feng , \" An Intrusion tolerant CA scheme \", Chinese Journal of Software , 13 ( 8 ), 1417 - 1422 , 2002 . Jiwu Jing, Dengguo Feng, \"An Intrusion tolerant CA scheme\", Chinese Journal of Software, 13(8), 1417-1422, 2002.","journal-title":"Chinese Journal of Software"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS03","name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","location":"Fairfax VA"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036927"}},"subtitle":["a highly attack resilient certification authority"],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":8,"alternative-id":["10.1145\/1036921.1036927","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036927","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}