{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:09Z","timestamp":1725475809204},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_13","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"149-162","source":"Crossref","is-referenced-by-count":1,"title":["Key Recovery System for the Commercial Environment"],"prefix":"10.1007","author":[{"given":"Juanma","family":"Gonz\u00e1lez Nieto","sequence":"first","affiliation":[]},{"given":"Kapali","family":"Viswanathan","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Atkinson, R.: IP Authentication Header. RFC 1826, NRL (August 1995)","DOI":"10.17487\/rfc1826"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Atkinson, R.: IP Encapsulating Security Payload. RFC 1827, NRL (August 1995)","DOI":"10.17487\/rfc1827"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/BFb0028495","volume-title":"Information and Communications Security","author":"C. Boyd","year":"1997","unstructured":"Boyd, C.: Enforcing traceability in software. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 398\u2013408. Springer, Heidelberg (1997)"},{"key":"13_CR4","unstructured":"CESG, Securing Electronic Mail within HMG - part 1: Infrastructure and Protocol, document T\/3113TL\/2776\/11 (March 1996), Available at: http:\/\/www.rdg.opengroup.org\/public\/tech\/security\/pki\/casm\/casm.htm"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Denning, D.E., Branstad, D.K.: A taxonomy for key escrow encryption systems. Communications of ACM, 34\u201340 (March 1996)","DOI":"10.1145\/227234.227239"},{"key":"13_CR6","unstructured":"ETSI TC-STAG. Security Techniques Advisory Group (STAG); Definition of User Requirements for Lawful Interception of telecommunications; Requirements of the Law Enforcement Agencies (December 1996) ETR 331"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fouque, P.A., Poupard, G., Stern, J.: Recovering keys in open networks. In: Proceedings of IEEE Information Theory and Communications Workshop (ITW 1999), Kruger National Park, SA (June 1999)","DOI":"10.1109\/ITCOM.1999.781406"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/S0167-4048(97)84642-1","volume":"16","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Karger, P., Matyas, S., Peyravian, M., Roginsky, A., Safford, D., Willet, M., Zunic, N.: Two-phase cryptographic key recovery system. Computers and Security\u00a016, 481\u2013506 (1997), Available at: http:\/\/www.ibm.com\/security\/library\/wpkey.html","journal-title":"Computers and Security"},{"key":"13_CR9","unstructured":"Government Information Technology Services. Key Recovery Demonstration project: Implementation Evaluation Criteria, Available at http:\/\/gits-sec.treas.gov\/krdpeval.htm"},{"key":"13_CR10","unstructured":"IBM KeyWorks Toolkit. Homepage, http:\/\/www-4.ibm.com\/software\/security\/keyworks\/"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Cryptography: Policy and Algorithms, pp. 98-104 (1996)","DOI":"10.1007\/BFb0032349"},{"key":"13_CR12","unstructured":"Key Recovery Alliance. Business Requirements for Key Recovery, white paper (December 1997), Available at http:\/\/www.kra.org"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - EUROCRYPT 1996","author":"L.R. Knudsen","year":"1996","unstructured":"Knudsen, L.R., Pedersen, T.P.: On the difficulty of software key escrow. In: Advances in Cryptology - EUROCRYPT 1996. LNCS, pp. 1\u20138. Springer, Heidelberg (1996)"},{"key":"13_CR14","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3233\/JCS-1998-6401","volume":"6","author":"L.R. Knudsen","year":"1999","unstructured":"Knudsen, L.R., Martin, K.M.: In search of multiple domain key recovery. Journal of Computer Security\u00a06, 219\u2013235 (1999)","journal-title":"Journal of Computer Security"},{"key":"13_CR15","unstructured":"Krisis Consortium. The Krisis Project (May 1998)"},{"key":"13_CR16","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., von Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"#cr-split#-13_CR17.1","unstructured":"National Institute of Standards and Technology, Govt. of U.S.A. Requirements for key recovery products, Available at http:\/\/csrc.nist.gov\/keyrecovery\/ (November 1998);"},{"key":"#cr-split#-13_CR17.2","unstructured":"Report of the Technical Advisory Committee to Develop A Federal Information Processing Standard for the Federal Key Management Infrastructure"},{"key":"13_CR18","unstructured":"National Research Council: Cryptography\u2019s Role in Securing the Information Society. National Academy Press (1996)"},{"key":"13_CR19","unstructured":"Personal communication with the authors"},{"issue":"1","key":"13_CR20","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/280559.280563","volume":"32","author":"B. Pfitzmann","year":"1998","unstructured":"Pfitzmann, B., Waidner, M.: How to break fraud-detectable key recovery. Operating Systems Review\u00a032(1), 23\u201328 (1998)","journal-title":"Operating Systems Review"},{"key":"13_CR21","unstructured":"U.S. DEPARTMENT OF COMMERCE \/ National Institute of Standards and Technology. Federal Information Processing Standard 185\u2014Escrowed Encryption Standard (February 1994)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/3-540-69053-0_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Binding elGamal: A fraud-detectable alternative to key-escrow proposals. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 119\u2013133. Springer, Heidelberg (1997)"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0054114","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Young","year":"1998","unstructured":"Young, A., Yung, M.: Auto-recoverable auto-certifiable cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 17\u201331. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:42:06Z","timestamp":1556005326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/10718964_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}