{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:57Z","timestamp":1725494457555},"publisher-location":"New York, NY","reference-count":7,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_57","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"616-619","source":"Crossref","is-referenced-by-count":6,"title":["Covert Distributed Processing with Computer Viruses"],"prefix":"10.1007","author":[{"given":"Steve R.","family":"White","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1145\/358453.358455","volume":"25","author":"J.F. Shoch","year":"1982","unstructured":"J.F. Shoch, J.A. Hupp, \u201cThe \u2018Worm\u2019 Programs-Early Experience with a Distributed Computation,\u201d CACM 25 (March 1982) pp. 172\u2013180","journal-title":"CACM"},{"key":"57_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"F. Cohen, \u201cComputer Viruses: Theory and Experiment,\u201d Computers & Security 6 (1987) pp. 22\u201335","journal-title":"Computers & Security"},{"key":"57_CR3","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/0167-4048(88)90334-3","volume":"7","author":"F. Cohen","year":"1988","unstructured":"F. Cohen, \u201cOn the Implications of Computer Viruses and Methods of Defense,\u201d Computers & Security 7 (1988) pp. 167\u2013184","journal-title":"Computers & Security"},{"issue":"6","key":"57_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie, M.E. Hellman, \u201cExhaustive Cryptanalysis of the NBS Data Encryption Standard,\u201d Computer, Vol. 10, No. 6 (June 1977) pp. 74\u201384","journal-title":"Computer"},{"key":"57_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00154339","volume":"1","author":"T.R. Caron","year":"1988","unstructured":"T.R. Caron, R.D. Silberman, \u201cParallel Implementation of the Quadratic Sieve,\u201d J. Supercomputing 1 (April 1988) pp. 273\u2013290","journal-title":"J. Supercomputing"},{"key":"57_CR6","unstructured":"A.K. Lenstra, M.S. Manasse, \u201cFactoring By Electronic Mail,\u201d Proc. Eurocrypt\u2019 89, Houthalen, Belgium (April 10\u201312, 1989) In press"},{"key":"57_CR7","unstructured":"J.-J. Quisquater, Y. Desmedt, \u201cWatch for the Chinese Loto and the Chinese Dragon,\u201d informal paper, Crypto\u2019 87 (To be published)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:32Z","timestamp":1619501312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_57","relation":{},"subject":[]}}