{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:02:02Z","timestamp":1725480122650},"publisher-location":"Boston, MA","reference-count":5,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475706048"},{"type":"electronic","value":"9781475706024"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1983]]},"DOI":"10.1007\/978-1-4757-0602-4_16","type":"book-chapter","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T17:14:41Z","timestamp":1366132481000},"page":"177-186","source":"Crossref","is-referenced-by-count":4,"title":["On the Security of Ping-Pong Protocols"],"prefix":"10.1007","author":[{"given":"D.","family":"Dolev","sequence":"first","affiliation":[]},{"given":"S.","family":"Even","sequence":"additional","affiliation":[]},{"given":"R. M.","family":"Karp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"16_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Trans. Infor. Th., Vol. IT-22, No. 6, November 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. Infor. Th"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Comm. ACM, Vol. 21, February 1978, pp. 120\u2013126.","journal-title":"Comm. ACM"},{"issue":"12","key":"16_CR3","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder, \u201cUsing Encryption for Authentication in Large Networks of Computers,\u201d Comm. ACM, Vol. 21, No. 12, December 1978, pp. 993\u2013999.","journal-title":"Comm. ACM"},{"key":"16_CR4","unstructured":"D. Dolev and A. C. Yao, \u201cOn the Security of Public Key Protocols,\u201d to appear, IEEE Trans. on IT."},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1145\/321738.321750","volume":"20","author":"BK Rosen","year":"1973","unstructured":"B. K. Rosen, \u201cTree-Manipulating Systems and Church Rosser Theorems,\u201d JACM, Vol. 20, No. 1, January 1973, pp. 160\u2013187.","journal-title":"JACM"}],"container-title":["Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4757-0602-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T05:48:31Z","timestamp":1557640111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4757-0602-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983]]},"ISBN":["9781475706048","9781475706024"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_16","relation":{},"subject":[],"published":{"date-parts":[[1983]]}}}