{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:13:53Z","timestamp":1763507633687,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102199.1102216","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"81-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Secure off-the-record messaging"],"prefix":"10.1145","author":[{"given":"Mario","family":"Di Raimondo","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Catania, Italy"}]},{"given":"Rosario","family":"Gennaro","sequence":"additional","affiliation":[{"name":"IBM T.J.Watson Research Center"}]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[{"name":"IBM T.J.Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"27","volume-title":"Proc. of the 2002 Workshop on Privacy Enhancing Technologies (PET 2002","author":"Abadi M.","year":"2003","unstructured":"M. Abadi , Private Authentication , Proc. of the 2002 Workshop on Privacy Enhancing Technologies (PET 2002 ), Springer-Verlag , pp. 27 -- 40 , 2003 .]] M. Abadi, Private Authentication, Proc. of the 2002 Workshop on Privacy Enhancing Technologies (PET 2002), Springer-Verlag, pp. 27--40, 2003.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276854"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_4_1","volume-title":"RFC2440","author":"Callas J.","year":"1998","unstructured":"J. Callas , L. Donnerhacke , H. Finney and R. Thayer , OpenPGP message format , RFC2440 , November 1998 .]] J. Callas, L. Donnerhacke, H. Finney and R. Thayer, OpenPGP message format, RFC2440, November 1998.]]"},{"key":"e_1_3_2_1_5_1","first-page":"453","volume-title":"LNCS 2045","author":"Canetti R.","year":"2001","unstructured":"R. Canetti and H. Krawczyk , Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Advances in Cryptology -- Proc. of EUROCRYPT '01 , LNCS 2045 , Springer-Verlag , pp. 453 -- 474 , 2001 .]] R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Advances in Cryptology -- Proc. of EUROCRYPT '01, LNCS 2045, Springer-Verlag, pp. 453--474, 2001.]]"},{"key":"e_1_3_2_1_6_1","first-page":"143","volume-title":"Advances in Cryptology -- Proc. of CRYPTO '02, LNCS 2442","author":"Canetti R.","year":"2002","unstructured":"R. Canetti and H. Krawczyk , Security Analysis of IKE's Signature-based Key-Exchange Protocol , Advances in Cryptology -- Proc. of CRYPTO '02, LNCS 2442 , Springer-Verlag , pp. 143 -- 161 , 2002 .]] R. Canetti and H. Krawczyk, Security Analysis of IKE's Signature-based Key-Exchange Protocol, Advances in Cryptology -- Proc. of CRYPTO '02, LNCS 2442, Springer-Verlag, pp. 143--161, 2002.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_9_1","volume-title":"Manuscript","author":"Di Raimondo M.","year":"2005","unstructured":"M. Di Raimondo , R. Gennaro and H. Krawczyk , Deniable authentication and Plaintext Awareness , Manuscript , August 2005 .]] M. Di Raimondo, R. Gennaro and H. Krawczyk, Deniable authentication and Plaintext Awareness, Manuscript, August 2005.]]"},{"key":"e_1_3_2_1_10_1","first-page":"399","volume-title":"Advances in Cryptology -- Proc. of CRYPTO '04, LNCS 3152","author":"Dodis Y.","year":"2004","unstructured":"Y. Dodis , R. Gennaro , J. H\u00e5stad , H. Krawczyk and T. Rabin , Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , Advances in Cryptology -- Proc. of CRYPTO '04, LNCS 3152 , Springer-Verlag , pp. 399 -- 424 , 2004 .]] Y. Dodis, R. Gennaro, J. H\u00e5stad, H. Krawczyk and T. Rabin, Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, Advances in Cryptology -- Proc. of CRYPTO '04, LNCS 3152, Springer-Verlag, pp. 399--424, 2004.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276853"},{"key":"e_1_3_2_1_12_1","first-page":"29","volume-title":"Advances in Cryptology -- Proc. of EUROCRYPT '89, LNCS 434","author":"Guenther C.G.","year":"1989","unstructured":"C.G. Guenther , An identity-based key-exchange protocol , Advances in Cryptology -- Proc. of EUROCRYPT '89, LNCS 434 , Springer-Verlag , pp. 29 -- 37 , 1989 .]] C.G. Guenther, An identity-based key-exchange protocol, Advances in Cryptology -- Proc. of EUROCRYPT '89, LNCS 434, Springer-Verlag, pp. 29--37, 1989.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"RFC","author":"Harkins D.","year":"1998","unstructured":"D. Harkins and D. Carrel , ed., The Internet Key Exchange (IKE) , RFC 2409, Nov. 1998 .]] D. Harkins and D. Carrel, ed., The Internet Key Exchange (IKE), RFC 2409, Nov. 1998.]]"},{"key":"e_1_3_2_1_14_1","first-page":"211","volume-title":"Advances in Cryptology -- Proc. of EUROCRYPT '03, LNCS 2656","author":"Katz J.","year":"2003","unstructured":"J. Katz , Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications , Advances in Cryptology -- Proc. of EUROCRYPT '03, LNCS 2656 , Springer-Verlag , pp. 211 -- 228 , 2003 .]] J. Katz, Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications, Advances in Cryptology -- Proc. of EUROCRYPT '03, LNCS 2656, Springer-Verlag, pp. 211--228, 2003.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman ed. Internet Key Exchange (IKEv2) Protocol draft-ietf-ipsec-ikev2-17.txt September 2004 (pending RFC).]]  C. Kaufman ed. Internet Key Exchange (IKEv2) Protocol draft-ietf-ipsec-ikev2-17.txt September 2004 (pending RFC).]]","DOI":"10.17487\/rfc4306"},{"key":"e_1_3_2_1_16_1","volume-title":"RFC2104","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare and R. Canetti , HMAC: Keyed-hashing for message authentication , RFC2104 , February 1997 .]] H. Krawczyk, M. Bellare and R. Canetti, HMAC: Keyed-hashing for message authentication, RFC2104, February 1997.]]"},{"volume-title":"1996 IEEE Symposium on Network and Distributed System Security (SNDSS '96)","author":"Krawczyk H.","key":"e_1_3_2_1_17_1","unstructured":"H. Krawczyk . SKEME : a versatile secure key exchange mechanism for Internet . 1996 IEEE Symposium on Network and Distributed System Security (SNDSS '96) .]] H. Krawczyk. SKEME: a versatile secure key exchange mechanism for Internet. 1996 IEEE Symposium on Network and Distributed System Security (SNDSS '96).]]"},{"key":"e_1_3_2_1_18_1","first-page":"400","volume-title":"Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729","author":"Krawczyk H.","year":"2003","unstructured":"H. Krawczyk , SIGMA: The 'SiGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols , Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729 , Springer-Verlag , pp. 400 -- 425 , 2003 . Available at http:\/\/www.ee.technion.ac.il\/hdir hugo\/sigma.html]] H. Krawczyk, SIGMA: The 'SiGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols, Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729, Springer-Verlag, pp. 400--425, 2003. Available at http:\/\/www.ee.technion.ac.il\/hdir hugo\/sigma.html]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_33"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022595222606"},{"key":"e_1_3_2_1_21_1","unstructured":"W. Mao and K.G. Paterson On the plausible deniability feature of Internet protocols Manuscript.]]  W. Mao and K.G. Paterson On the plausible deniability feature of Internet protocols Manuscript.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_23_1","first-page":"316","volume-title":"Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729","author":"Pass R.","year":"2003","unstructured":"R. Pass , On Deniability in the Common Reference String and Random Oracle Model , Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729 , Springer-Verlag , pp. 316 -- 337 , 2003 .]] R. Pass, On Deniability in the Common Reference String and Random Oracle Model, Advances in Cryptology -- Proc. of CRYPTO '03, LNCS 2729, Springer-Verlag, pp. 316--337, 2003.]]"},{"volume-title":"2000 IEEE Symposium on Security and Privacy.]]","author":"D.","key":"e_1_3_2_1_24_1","unstructured":"Adrian Perrig, Ran Canetti, J. D. Tygar and Dawn Song, Efficient Authentication and Signing of Multicast Streams over Lossy Channels , 2000 IEEE Symposium on Security and Privacy.]] Adrian Perrig, Ran Canetti, J.D. Tygar and Dawn Song, Efficient Authentication and Signing of Multicast Streams over Lossy Channels, 2000 IEEE Symposium on Security and Privacy.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Editor B. Ramsdell S\/MIME version 3 message specification RFC2633 June 1999.]]   Editor B. Ramsdell S\/MIME version 3 message specification RFC2633 June 1999.]]","DOI":"10.17487\/rfc2633"},{"key":"e_1_3_2_1_26_1","first-page":"37","volume-title":"6th USENIX Security Symposium","author":"Ylonen T.","year":"1996","unstructured":"T. Ylonen , SSH secure login connections over the Internet , 6th USENIX Security Symposium , pp. 37 -- 42 , San Jose, CA , July 1996 .]] T. Ylonen, SSH secure login connections over the Internet, 6th USENIX Security Symposium, pp. 37--42, San Jose, CA, July 1996.]]"},{"key":"e_1_3_2_1_27_1","volume-title":"The Official PGP User's Guide","author":"Zimmerman P.","year":"1995","unstructured":"P. Zimmerman , The Official PGP User's Guide , MIT Press , 1995 .]] P. Zimmerman, The Official PGP User's Guide, MIT Press, 1995.]]"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 ACM workshop on Privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102199.1102216","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102199.1102216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102199.1102216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":27,"alternative-id":["10.1145\/1102199.1102216","10.1145\/1102199"],"URL":"https:\/\/doi.org\/10.1145\/1102199.1102216","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}