{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:28:50Z","timestamp":1725481730033},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540502517"},{"type":"electronic","value":"9783540459613"}],"license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1988]]},"DOI":"10.1007\/3-540-45961-8_9","type":"book-chapter","created":{"date-parts":[[2007,3,5]],"date-time":"2007-03-05T11:43:15Z","timestamp":1173094995000},"page":"97-106","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Manipulations and Errors, Detection and Localization"],"prefix":"10.1007","author":[{"given":"Ph.","family":"Godlewski","sequence":"first","affiliation":[]},{"given":"P.","family":"Camion","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"9_CR1","volume-title":"Security for computer Networks","author":"D.W. Davies","year":"1984","unstructured":"D.W. Davies and W.L. Price, \u201cSecurity for computer Networks\u201d, John Wiley and Sons, Chichester 1984."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"R.R. Jueneman, \u201cA High Speed Manipulation Detection Codes\u201d, Proceeding of crypto 86, Springer-Verlag 1987, pp.327\u2013346.","DOI":"10.1007\/3-540-47721-7_25"},{"key":"9_CR3","unstructured":"M. Campana and M. Girault, \u201cHow to Use Compressed Encoding Mechanisms in Data Protection\u201d, Securicom 88, March 15\u201317, pp.91\u2013110."},{"key":"9_CR4","series-title":"Lect Notes Comput Sci","volume-title":"AAECC","author":"P. Camion","year":"1986","unstructured":"P. Camion, \u201cCan a Fast signature Scheme Without Secret Key be Secure?\u201d, in AAECC, Lecture Notes in Computer Science, no228, Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201988"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45961-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:27:36Z","timestamp":1558258056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45961-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988]]},"ISBN":["9783540502517","9783540459613"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-45961-8_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1988]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}