{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:45Z","timestamp":1725549345736},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_41","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T08:53:57Z","timestamp":1127811237000},"page":"336-340","source":"Crossref","is-referenced-by-count":0,"title":["Blind Publication: A Copyright Library without Publication or Trust"],"prefix":"10.1007","author":[{"given":"James A.","family":"Malcolm","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BFb0028163","volume-title":"Security Protocols","author":"B. Christianson","year":"1998","unstructured":"Christianson, B., Malcolm, J.A.: Binding bit patterns to real world entities. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 105\u2013113. Springer, Heidelberg (1998)"},{"issue":"7","key":"41_CR2","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"41_CR3","volume-title":"Human Behavior and the Principle of Least Effort","author":"G.K. Zipf","year":"1949","unstructured":"Zipf, G.K.: Human Behavior and the Principle of Least Effort. Addison-Wesley, Reading (1949)"},{"volume-title":"Handbook of Standards and Resources for Spoken Language Systems","year":"1997","key":"41_CR4","unstructured":"Gibbon, D., Moore, R., Winski, R. (eds.): Handbook of Standards and Resources for Spoken Language Systems. Mouton de Gruyter, Berlin (1997)"},{"key":"41_CR5","unstructured":"Reid, T.: North Korean MiGs intercept spy plane. The Times, March 4 (2003)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:56:36Z","timestamp":1619492196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11542322_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}