{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:38:18Z","timestamp":1725457098174},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540607595"},{"type":"electronic","value":"9783540493631"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0032350","type":"book-chapter","created":{"date-parts":[[2005,12,11]],"date-time":"2005-12-11T06:40:51Z","timestamp":1134283251000},"page":"105-114","source":"Crossref","is-referenced-by-count":8,"title":["A new key escrow cryptosystem"],"prefix":"10.1007","author":[{"given":"Jingmin","family":"He","sequence":"first","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,28]]},"reference":[{"key":"8_CR1","unstructured":"D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"T.Beth, H.Knobloch,M.Otten,G.J.Simmons, and P.Wichmann, Towards acceptable key escrow systems, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.51\u201358.","DOI":"10.1145\/191177.191191"},{"key":"8_CR3","unstructured":"T.Beth and M.Otten, eds, Proceedings of the E.I.S.S. Workshop on Escrowed Key Cryptography, Workshop held at the European Institute for System Security, University of Karlsruhe, June 22\u201324, 1994."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59\u201367.","DOI":"10.1145\/191177.191193"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"B.Chor, A.Fiat and M.Naor, Tracing traitors, CRYPTO'94, pp.257\u2013270.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"8_CR6","unstructured":"Y.Desmedt, How to secure the LEAF in Clipper Alternatives, in [3], pp.78\u201386."},{"key":"8_CR7","unstructured":"S.Micali, Fair public-key cryptosystems, CRYPTO'92, pp."},{"key":"8_CR8","unstructured":"National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994."},{"key":"8_CR9","unstructured":"M.Smid, US government key escrow, talk outline in [3], pp. 45\u201355."}],"container-title":["Lecture Notes in Computer Science","Cryptography: Policy and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0032350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T13:48:14Z","timestamp":1586612894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0032350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540607595","9783540493631"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0032350","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}