{"id":"https://openalex.org/W1502887993","doi":"https://doi.org/10.1007/3-540-47719-5_34","title":"How to Construct Fail-Stop Confirmer Signature Schemes","display_name":"How to Construct Fail-Stop Confirmer Signature Schemes","publication_year":2001,"publication_date":"2001-01-01","ids":{"openalex":"https://openalex.org/W1502887993","doi":"https://doi.org/10.1007/3-540-47719-5_34","mag":"1502887993"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-47719-5_34","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-47719-5_34","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Rei Safavi-Naini","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090841998","display_name":"Huaxiong Wang","orcid":"https://orcid.org/0000-0002-7669-8922"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Huaxiong Wang","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010447902"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0899739,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.8910396695137024},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7723792791366577},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6475303173065186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5993243455886841},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5267776250839233},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.100942462682724},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.05920332670211792}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.8910396695137024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7723792791366577},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6475303173065186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5993243455886841},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5267776250839233},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.100942462682724},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.05920332670211792},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/3-540-47719-5_34","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-47719-5_34","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.119.931","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ics.mq.edu.au/~hwang/FSCSfinal.ps","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W115629558","https://openalex.org/W1488721365","https://openalex.org/W1519095911","https://openalex.org/W1526663888","https://openalex.org/W1528528992","https://openalex.org/W1561489932","https://openalex.org/W1564775601","https://openalex.org/W1575891128","https://openalex.org/W1583512970","https://openalex.org/W1589205472","https://openalex.org/W1590226992","https://openalex.org/W1595153681","https://openalex.org/W1751556912","https://openalex.org/W1895456600","https://openalex.org/W1970606468","https://openalex.org/W1983341988","https://openalex.org/W2101803085","https://openalex.org/W2102096015","https://openalex.org/W2117436215","https://openalex.org/W2143832005","https://openalex.org/W2151413173","https://openalex.org/W2153906688","https://openalex.org/W2156186849","https://openalex.org/W2181245690","https://openalex.org/W2241890756","https://openalex.org/W2476012767","https://openalex.org/W2476858769","https://openalex.org/W2483988241","https://openalex.org/W2484860292","https://openalex.org/W2485204867","https://openalex.org/W2490520464","https://openalex.org/W2495595500","https://openalex.org/W2498149115","https://openalex.org/W2502753018","https://openalex.org/W2505944591","https://openalex.org/W2506735936","https://openalex.org/W2911473785","https://openalex.org/W4205482880"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W2808242528","https://openalex.org/W1567638270","https://openalex.org/W4285163392","https://openalex.org/W3110049015"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
