{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:47Z","timestamp":1750220747721,"version":"3.41.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>As online sources are becoming more prevalent in journalism and scientific literature, the ephemeral nature of the World Wide Web is becoming an increasingly serious issue for their verifiability, replicability, and reproducibility. The architecture of Webchain, a new system enabling source and reference verifiability on the Web, is combining distributed ledger technologies with secure timestamping to ensure the history of creation, ownership, and referential integrity of online resources. We present the architecture and system extensions, conduct a security analysis, and evaluate the Webchain system based on a comprehensive prototype implementation. The results confirm the feasibility and robustness of our approach.<\/jats:p>","DOI":"10.1145\/3392097","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Reference Verifiability for the World Wide Web with Webchain"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1651-9838","authenticated-orcid":false,"given":"Elias","family":"Rohrer","sequence":"first","affiliation":[{"name":"Distributed Security Infrastructures, Technical University of Berlin, Berlin"}]},{"given":"Steffen","family":"Heidel","sequence":"additional","affiliation":[{"name":"Distributed Security Infrastructures, Technical University of Berlin, Berlin"}]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[{"name":"Distributed Security Infrastructures, Technical University of Berlin, Berlin"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"#cr-split#-e_1_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc4033.txt. DOI:https:\/\/doi.org\/10.17487\/RFC4033 10.17487\/RFC4033","DOI":"10.17487\/rfc4033"},{"key":"#cr-split#-e_1_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc4033.txt. DOI:https:\/\/doi.org\/10.17487\/RFC4033","DOI":"10.17487\/rfc4033"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2243"},{"key":"e_1_2_1_3_1","volume-title":"Weigle","author":"Aturban Mohamed","year":"2017","unstructured":"Mohamed Aturban , Michael L. Nelson , and Michele C . Weigle . 2017 . Difficulties of timestamping archived web pages. CoRR abs\/1712.03140 (2017). arXiv:1712.03140 Mohamed Aturban, Michael L. Nelson, and Michele C. Weigle. 2017. Difficulties of timestamping archived web pages. CoRR abs\/1712.03140 (2017). arXiv:1712.03140"},{"key":"e_1_2_1_4_1","volume-title":"P2P file system. CoRR abs\/1407.3561","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. IPFS\u2014Content addressed, versioned , P2P file system. CoRR abs\/1407.3561 ( 2014 ). arXiv:1407.3561 Juan Benet. 2014. IPFS\u2014Content addressed, versioned, P2P file system. CoRR abs\/1407.3561 (2014). arXiv:1407.3561"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein. 2008. The Salsa20 family of stream ciphers. In New Stream Cipher Designs\u2014The eSTREAM Finalists. 84--97.  Daniel J. Bernstein. 2008. The Salsa20 family of stream ciphers. In New Stream Cipher Designs\u2014The eSTREAM Finalists. 84--97.","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_2_1_8_1","unstructured":"BTC.com. 2018. Pool Distribution. Retrieved from https:\/\/btc.com\/stats\/pool?pool_mode\u030dweek.  BTC.com. 2018. Pool Distribution. Retrieved from https:\/\/btc.com\/stats\/pool?pool_mode\u030dweek."},{"key":"e_1_2_1_9_1","first-page":"77","article-title":"Exploring the half-life of Internet footnotes","volume":"37","author":"Bugeja Michael J.","year":"2005","unstructured":"Michael J. Bugeja and Daniela Dimitrova . 2005 . Exploring the half-life of Internet footnotes . Iowa J. Commun. 37 , 1 (2005), 77 . Michael J. Bugeja and Daniela Dimitrova. 2005. Exploring the half-life of Internet footnotes. Iowa J. Commun. 37, 1 (2005), 77.","journal-title":"Iowa J. Commun."},{"key":"#cr-split#-e_1_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. OpenPGP Message Format. RFC 4880 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt. DOI:https:\/\/doi.org\/10.17487\/RFC4880 10.17487\/RFC4880","DOI":"10.17487\/rfc4880"},{"key":"#cr-split#-e_1_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. OpenPGP Message Format. RFC 4880 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt. DOI:https:\/\/doi.org\/10.17487\/RFC4880","DOI":"10.17487\/rfc4880"},{"key":"#cr-split#-e_1_2_1_11_1.1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt. DOI:https:\/\/doi.org\/10.17487\/RFC5280 10.17487\/RFC5280","DOI":"10.17487\/rfc5280"},{"key":"#cr-split#-e_1_2_1_11_1.2","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt. DOI:https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/rfc5280"},{"key":"e_1_2_1_12_1","volume-title":"Schilling","author":"Dellavalle Robert P.","year":"2003","unstructured":"Robert P. Dellavalle , Eric J. Hester , Lauren F. Heilig , Amanda L. Drake , Jeff W. Kuntzman , Marla Graber , and Lisa M . Schilling . 2003 . Going, going, gone: Lost Internet references. Science 302, 5646 (2003), 787--788. Robert P. Dellavalle, Eric J. Hester, Lauren F. Heilig, Amanda L. Drake, Jeff W. Kuntzman, Marla Graber, and Lisa M. Schilling. 2003. Going, going, gone: Lost Internet references. Science 302, 5646 (2003), 787--788."},{"key":"e_1_2_1_13_1","first-page":"5","article-title":"Going, going, still there: Using the WebCite service to permanently archive cited web pages","volume":"7","author":"Eysenbach Gunther","year":"2005","unstructured":"Gunther Eysenbach and Mathieu Trudel . 2005 . Going, going, still there: Using the WebCite service to permanently archive cited web pages . JMIR 7 , 5 (Dec. 2005). Gunther Eysenbach and Mathieu Trudel. 2005. Going, going, still there: Using the WebCite service to permanently archive cited web pages. JMIR 7, 5 (Dec. 2005).","journal-title":"JMIR"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 1st Workshop on the Theory and Practice of Provenance (TaPP\u201909)","author":"Factor Michael","year":"2009","unstructured":"Michael Factor , Ealan Henis , Dalit Naor , Simona Rabinovici-Cohen , Petra Reshef , Shahar Ronen , Giovanni Michetti , and Maria Guercio . 2009 . Authenticity and provenance in long term digital preservation: Modeling and implementation in preservation aware storage . In Proceedings of the 1st Workshop on the Theory and Practice of Provenance (TaPP\u201909) . Michael Factor, Ealan Henis, Dalit Naor, Simona Rabinovici-Cohen, Petra Reshef, Shahar Ronen, Giovanni Michetti, and Maria Guercio. 2009. Authenticity and provenance in long term digital preservation: Modeling and implementation in preservation aware storage. In Proceedings of the 1st Workshop on the Theory and Practice of Provenance (TaPP\u201909)."},{"key":"e_1_2_1_15_1","volume-title":"Stds. (NIST FIPS)","author":"Inf Federal","year":"2015","unstructured":"Federal Inf . Process . Stds. (NIST FIPS) . 2015 . FIPS PUB 180-4. Secure hash standard. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf. Federal Inf. Process. Stds. (NIST FIPS). 2015. FIPS PUB 180-4. Secure hash standard. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf."},{"key":"e_1_2_1_16_1","first-page":"803","article-title":"A decentralized public key infrastructure with identity retention","volume":"2014","author":"Fromknecht Conner","year":"2014","unstructured":"Conner Fromknecht , Dragos Velicanu , and Sophia Yakoubov . 2014 . A decentralized public key infrastructure with identity retention . IACR Cryptol. ePrint Arch. 2014 (2014), 803 . Conner Fromknecht, Dragos Velicanu, and Sophia Yakoubov. 2014. A decentralized public key infrastructure with identity retention. IACR Cryptol. ePrint Arch. 2014 (2014), 803.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/03071840408522977"},{"key":"e_1_2_1_20_1","unstructured":"Gregory Grefenstette and Pasi Tapanainen. 1994. What is a word what is a sentence?: Problems of tokenisation.  Gregory Grefenstette and Pasi Tapanainen. 1994. What is a word what is a sentence?: Problems of tokenisation."},{"volume-title":"Proceedings of the 10th Conference on Advances in Cryptology (CRYPTO\u201990)","author":"Haber Stuart","key":"e_1_2_1_21_1","unstructured":"Stuart Haber and W. Scott Stornetta . 1990. How to time-stamp a digital document . In Proceedings of the 10th Conference on Advances in Cryptology (CRYPTO\u201990) , Alfred Menezes and Scott A. Vanstone (Eds.). 437--455. Stuart Haber and W. Scott Stornetta. 1990. How to time-stamp a digital document. In Proceedings of the 10th Conference on Advances in Cryptology (CRYPTO\u201990), Alfred Menezes and Scott A. Vanstone (Eds.). 437--455."},{"key":"e_1_2_1_22_1","article-title":"Preventing history forgery with secure provenance","volume":"5","author":"Hasan Ragib","year":"2009","unstructured":"Ragib Hasan , Radu Sion , and Marianne Winslett . 2009 . Preventing history forgery with secure provenance . Trans. Stor. 5 , 4 (2009), 12:1--12:43. Ragib Hasan, Radu Sion, and Marianne Winslett. 2009. Preventing history forgery with secure provenance. Trans. Stor. 5, 4 (2009), 12:1--12:43.","journal-title":"Trans. Stor."},{"key":"e_1_2_1_23_1","unstructured":"Javier C. Hernandez. 2017. Leading Western Publisher Bows to Chinese Censorship. Retrieved from https:\/\/nyti.ms\/2z3K5aZ.  Javier C. Hernandez. 2017. Leading Western Publisher Bows to Chinese Censorship. Retrieved from https:\/\/nyti.ms\/2z3K5aZ."},{"key":"#cr-split#-e_1_2_1_24_1.1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and J. Schlyter. 2012. The DNS-based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc6698.txt. DOI:https:\/\/doi.org\/10.17487\/RFC6698 10.17487\/RFC6698","DOI":"10.17487\/rfc6698"},{"key":"#cr-split#-e_1_2_1_24_1.2","doi-asserted-by":"crossref","unstructured":"P. Hoffman and J. Schlyter. 2012. The DNS-based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698 (Proposed Standard). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc6698.txt. DOI:https:\/\/doi.org\/10.17487\/RFC6698","DOI":"10.17487\/rfc6698"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 5th International Provenance and Annotation Workshop (IPAW\u201914)","author":"Huynh Trung Dong","year":"2014","unstructured":"Trung Dong Huynh and Luc Moreau . 2014 . ProvStore: A public provenance repository . In Proceedings of the 5th International Provenance and Annotation Workshop (IPAW\u201914) . 275--277. Trung Dong Huynh and Luc Moreau. 2014. ProvStore: A public provenance repository. In Proceedings of the 5th International Provenance and Annotation Workshop (IPAW\u201914). 275--277."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.665468"},{"key":"e_1_2_1_28_1","first-page":"9","article-title":"A longitudinal study of Web pages continued: A consideration of document persistence. Info","volume":"9","author":"Koehler Wallace","year":"2004","unstructured":"Wallace Koehler . 2004 . A longitudinal study of Web pages continued: A consideration of document persistence. Info . Res. 9 , 2 (2004), 9 -- 2 . Wallace Koehler. 2004. A longitudinal study of Web pages continued: A consideration of document persistence. Info. Res. 9, 2 (2004), 9--2.","journal-title":"Res."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2419657"},{"key":"e_1_2_1_30_1","unstructured":"The Go Programming Language. 2019. Website. Retrieved from https:\/\/golang.org.  The Go Programming Language. 2019. Website. Retrieved from https:\/\/golang.org."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_1_33_1","volume-title":"Wayback Machine","author":"Archive Internet","year":"2019","unstructured":"Internet Archive : Wayback Machine . 2019 . Website. Retrieved from https:\/\/archive.org\/web\/. Internet Archive: Wayback Machine. 2019. Website. Retrieved from https:\/\/archive.org\/web\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Melara Marcela S.","key":"e_1_2_1_37_1","unstructured":"Marcela S. Melara , Aaron Blankstein , Joseph Bonneau , Edward W. Felten , and Michael J. Freedman . 2015. CONIKS: Bringing key transparency to end users . In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915) . 383--398. Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing key transparency to end users. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 383--398."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 7th Conference on Advances in Cryptology (CRYPTO\u201987)","author":"Merkle Ralph C.","year":"1987","unstructured":"Ralph C. Merkle . 1987 . A digital signature based on a conventional encryption function . In Proceedings of the 7th Conference on Advances in Cryptology (CRYPTO\u201987) . 369--378. Ralph C. Merkle. 1987. A digital signature based on a conventional encryption function. In Proceedings of the 7th Conference on Advances in Cryptology (CRYPTO\u201987). 369--378."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032990"},{"key":"e_1_2_1_40_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Retrieved from https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_2_1_41_1","unstructured":"Namecoin. 2019. Website. Retrieved from https:\/\/namecoin.info.  Namecoin. 2019. Website. Retrieved from https:\/\/namecoin.info."},{"key":"#cr-split#-e_1_2_1_42_1.1","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2015. ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (Informational). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc7539.txt. DOI:https:\/\/doi.org\/10.17487\/RFC7539 10.17487\/RFC7539","DOI":"10.17487\/RFC7539"},{"key":"#cr-split#-e_1_2_1_42_1.2","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2015. ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (Informational). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc7539.txt. DOI:https:\/\/doi.org\/10.17487\/RFC7539","DOI":"10.17487\/RFC7539"},{"key":"e_1_2_1_43_1","unstructured":"U.S. National Library of Medicine National Institutes of Health. 2019. PubMed Website. Retrieved from https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/.  U.S. National Library of Medicine National Institutes of Health. 2019. PubMed Website. Retrieved from https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/."},{"key":"e_1_2_1_44_1","unstructured":"OpenTimestamps. 2019. Website. Retrieved from https:\/\/opentimestamps.org.  OpenTimestamps. 2019. Website. Retrieved from https:\/\/opentimestamps.org."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/972695.972697"},{"key":"e_1_2_1_46_1","unstructured":"Perma.cc. 2019. Website. Retrieved from https:\/\/perma.cc.  Perma.cc. 2019. Website. Retrieved from https:\/\/perma.cc."},{"volume-title":"Proceedings of the 5th Applied Natural Language Processing Conference (ANLP\u201997)","author":"Jeffrey","key":"e_1_2_1_47_1","unstructured":"Jeffrey C. Reynar and Adwait Ratnaparkhi. 1997. A maximum entropy approach to identifying sentence boundaries . In Proceedings of the 5th Applied Natural Language Processing Conference (ANLP\u201997) . 16--19. Jeffrey C. Reynar and Adwait Ratnaparkhi. 1997. A maximum entropy approach to identifying sentence boundaries. In Proceedings of the 5th Applied Natural Language Processing Conference (ANLP\u201997). 16--19."},{"volume-title":"Digital methods for web research. Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource","author":"Rogers Richard","key":"e_1_2_1_48_1","unstructured":"Richard Rogers . 2015. Digital methods for web research. Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource . John Wiley 8 Sons, New Jersey, 1--22. Richard Rogers. 2015. Digital methods for web research. Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource. John Wiley 8 Sons, New Jersey, 1--22."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00235"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355469"},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Jo\u00e3o Santos Nuno Santos and David Dias. 2019. DClaims: A censorship resistant web annotations system using IPFS and Ethereum. Retrieved from arxiv:1912.03388.  Jo\u00e3o Santos Nuno Santos and David Dias. 2019. DClaims: A censorship resistant web annotations system using IPFS and Ethereum. Retrieved from arxiv:1912.03388.","DOI":"10.1145\/3341105.3374049"},{"key":"e_1_2_1_52_1","unstructured":"LibP2P. A Modular Networking Stack.2019. Website. Retrieved from https:\/\/libp2p.io.  LibP2P. A Modular Networking Stack.2019. Website. Retrieved from https:\/\/libp2p.io."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_2_1_54_1","first-page":"16","article-title":"The future of journalism: Networked journalism","volume":"6","author":"der Haak Bregtje Van","year":"2012","unstructured":"Bregtje Van der Haak , Michael Parks , and Manuel Castells . 2012 . The future of journalism: Networked journalism . Int. J. Commun. 6 (2012), 16 . Bregtje Van der Haak, Michael Parks, and Manuel Castells. 2012. The future of journalism: Networked journalism. Int. J. Commun. 6 (2012), 16.","journal-title":"Int. J. Commun."},{"key":"e_1_2_1_55_1","unstructured":"Vue.js. 2020. Website. Retrieved from https:\/\/vuejs.org\/.  Vue.js. 2020. Website. Retrieved from https:\/\/vuejs.org\/."},{"key":"e_1_2_1_56_1","unstructured":"W3C. 2020. PROV-Overview. Retrieved from https:\/\/www.w3.org\/TR\/prov-overview\/.  W3C. 2020. PROV-Overview. Retrieved from https:\/\/www.w3.org\/TR\/prov-overview\/."},{"key":"e_1_2_1_57_1","unstructured":"W3C. 2020. Web Annotation Working Group. Retrieved from https:\/\/www.w3.org\/annotation\/.  W3C. 2020. Web Annotation Working Group. Retrieved from https:\/\/www.w3.org\/annotation\/."},{"key":"e_1_2_1_58_1","unstructured":"WordPress. 2019. Website. Retrieved from https:\/\/wordpress.org.  WordPress. 2019. Website. Retrieved from https:\/\/wordpress.org."},{"key":"#cr-split#-e_1_2_1_59_1.1","doi-asserted-by":"crossref","unstructured":"P. Wouters. 2016. DNS-based Authentication of Named Entities (DANE) Bindings for OpenPGP. RFC 7929 (Experimental). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc7929.txt. DOI:https:\/\/doi.org\/10.17487\/RFC7929 10.17487\/RFC7929","DOI":"10.17487\/RFC7929"},{"key":"#cr-split#-e_1_2_1_59_1.2","doi-asserted-by":"crossref","unstructured":"P. Wouters. 2016. DNS-based Authentication of Named Entities (DANE) Bindings for OpenPGP. RFC 7929 (Experimental). Retrieved from https:\/\/www.rfc-editor.org\/rfc\/rfc7929.txt. DOI:https:\/\/doi.org\/10.17487\/RFC7929","DOI":"10.17487\/RFC7929"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3392097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:48Z","timestamp":1750199928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3392097"],"URL":"https:\/\/doi.org\/10.1145\/3392097","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}