{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:50Z","timestamp":1750307570643,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1742006","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"448-450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of message layer protocol with non-repudiation"],"prefix":"10.1145","author":[{"given":"S. A.","family":"Thorat","sequence":"first","affiliation":[{"name":"Rajiv Gandhi Institute of Technology, Versova, Andheri (W), Mumbai"}]},{"given":"M.","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Ramrao Adik Institute of Technology, Nerul, Navi Mumbai"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2004","volume-title":"Proc. 2004 of the Seventh IEEE International Symposium on Object-Oriented Real-Time Distributed Computing","author":"Jie Xu Multi-Party","unstructured":"Dacheng Zhang and Jie Xu , \" Multi-Party Authentication for Web Services : Protocols, Implementation and Evaluation \", Proc. 2004 of the Seventh IEEE International Symposium on Object-Oriented Real-Time Distributed Computing , pp. 2004 . Dacheng Zhang and Jie Xu, \"Multi-Party Authentication for Web Services: Protocols, Implementation and Evaluation\", Proc. 2004 of the Seventh IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, pp. 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings, \"IEEE Web Services Security Symposium (WSSS) 2006\"","author":"Online","year":"2006","unstructured":"Online Proceedings, \"IEEE Web Services Security Symposium (WSSS) 2006\" , May 21, 2006 . Online Proceedings, \"IEEE Web Services Security Symposium (WSSS) 2006\", May 21, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111348.1111355"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.412.0228"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/580055.829317"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www-106.ibm.com\/developerworks\/library\/ws-secure\/ (1 of 22)","author":"Bob Atkinson Microsoft","year":"2002","unstructured":"Bob Atkinson , Microsoft , Giovanni Della-Libera , Microsoft , Satoshi Hada , IBM , Maryann Hondo , IBM , Phillip Hallam-Baker , VeriSign , Johannes Klein , Microsoft , Brian LaMacchia , Microsoft , Paul Leach , Microsoft , John Manferdelli , Microsoft , Hiroshi Maruyama , IBM , Anthony Nadalin , IBM , Nataraj Nagaratnam , IBM , Hemma Prafullchandra , VeriSign , John Shewchuk , Microsoft , Dan Simon , Microsoft , \"Web Services Security (WS-Security) Version 1.0 05\" , http:\/\/www-106.ibm.com\/developerworks\/library\/ws-secure\/ (1 of 22) April 2002 . Bob Atkinson, Microsoft, Giovanni Della-Libera, Microsoft, Satoshi Hada, IBM, Maryann Hondo, IBM, Phillip Hallam-Baker, VeriSign, Johannes Klein, Microsoft, Brian LaMacchia, Microsoft, Paul Leach, Microsoft, John Manferdelli, Microsoft, Hiroshi Maruyama, IBM, Anthony Nadalin, IBM, Nataraj Nagaratnam, IBM, Hemma Prafullchandra, VeriSign, John Shewchuk, Microsoft, Dan Simon, Microsoft, \"Web Services Security (WS-Security) Version 1.0 05\", http:\/\/www-106.ibm.com\/developerworks\/library\/ws-secure\/ (1 of 22) April 2002."},{"key":"e_1_3_2_1_7_1","unstructured":"W3C NOTE \"SOAP Security Extensions: Digital Signature\" http:\/\/www.w3.org\/TR\/SOAP-dsig.  W3C NOTE \"SOAP Security Extensions: Digital Signature\" http:\/\/www.w3.org\/TR\/SOAP-dsig."},{"key":"e_1_3_2_1_8_1","volume-title":"April","author":"Vasudevan A Web Services","year":"2001","unstructured":"V. Vasudevan , \" A Web Services Primer\" , http:\/\/www.xml.com\/pub\/a\/2001\/04\/04\/Web services\/ , April 2001 . V. Vasudevan, \"A Web Services Primer\", http:\/\/www.xml.com\/pub\/a\/2001\/04\/04\/Web services\/, April 2001."}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1742006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1742006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:01Z","timestamp":1750250461000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1742006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":8,"alternative-id":["10.1145\/1741906.1742006","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1742006","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}