{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:40:23Z","timestamp":1778344823250,"version":"3.51.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319459813","type":"print"},{"value":"9783319459820","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45982-0_22","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T10:31:38Z","timestamp":1472034698000},"page":"244-254","source":"Crossref","is-referenced-by-count":28,"title":["End-to-End Encrypted Messaging Protocols: An Overview"],"prefix":"10.1007","author":[{"given":"Ksenia","family":"Ermoshina","sequence":"first","affiliation":[]},{"given":"Francesca","family":"Musiani","sequence":"additional","affiliation":[]},{"given":"Harry","family":"Halpin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"22_CR1","unstructured":"Rogaway, P.: The moral character of cryptographic work. In: IACR Distinguished Lecture at Asiacrypt 2015 (2015). http:\/\/web.cs.ucdavis.edu\/~rogaway\/papers\/moral.pdf"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Unger, N., Dechand, S., Bonneau, J., Fahl, S., Perl, H., Goldberg, I., Smith, M.: SoK: secure messaging. In: 2015 IEEE Symposium on Security and Privacy, pp. 232\u2013249. IEEE (2015)","DOI":"10.1109\/SP.2015.22"},{"key":"22_CR3","unstructured":"Whitten, A., Tygar. J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium (SSYM 1999), vol. 8, p. 14. USENIX Association, Berkeley (1999)"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004). https:\/\/otr.cypherpunks.ca\/otr-wpes.pdf , doi: 10.1145\/1029179.1029200","DOI":"10.1145\/1029179.1029200"},{"key":"22_CR5","unstructured":"Prokop, A.: Solving the WebRTC interoperability problem. NoJitter (2015). http:\/\/www.nojitter.com\/post\/240169575\/solving-the-webrtc-interoperability-problem"},{"key":"22_CR6","unstructured":"Weinberger, M.: Matrix wants to smash the walled gardens of messaging. ITworld, 16 September 2014. http:\/\/www.itworld.com\/article\/2694500\/unified-communications\/matrix-wants-to-smash-the-walled-gardens-of-messaging.html"},{"key":"22_CR7","unstructured":"Marlinspike, M.: Advanced cryptographic ratcheting. OpenWhisperSystems, 26 November 2013. https:\/\/whispersystems.org\/blog\/advanced-ratcheting\/"},{"key":"22_CR8","unstructured":"Straub, A.: \u201cOMEMO Encryption\u201d, a protoXEP standards track proposed to XMPP, 25 October 2015. https:\/\/xmpp.org\/extensions\/inbox\/omemo.html#intro-motivation"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"M\u00e9adel, C., Musiani, F. (coord.): Ab\u00e9c\u00e9daire des architectures distribu\u00e9es, Presses des Mines. In: Musiani, F., Cogburn, D.L., DeNardis, L., Levinson, N.S. (dir.): The Turn to Infrastructure in Internet Governance. Palgrave Macmillan (2015)","DOI":"10.4000\/books.pressesmines.2095"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Ermoshina, K.: Democracy as pothole repair: civic applications and cyber-empowerment in Russia. Cyberpsychol. J. Psychosoc. Res. Cyberspace 8(3) (2014). Article no: 1, doi: 10.5817\/CP2014-3-4","DOI":"10.5817\/CP2014-3-4"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Van den Hooff, L., et al.: Vuvuzela: scalable private messaging resistant to traffic analysis. In: Proceedings of SOSP 2015 (2015). http:\/\/dx.doi.org\/10.1145\/2815400.2815417","DOI":"10.1145\/2815400.2815417"},{"key":"22_CR12","unstructured":"Sanger, D., Perlroth, N.: Encrypted messaging apps face new scrutiny over possible role in Paris attacks. New York Times (2015). http:\/\/www.nytimes.com\/2015\/11\/17\/world\/europe\/encrypted-messaging-apps-face-new-scrutiny-over-possible-role-in-paris-attacks.html"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Musiani, F., Cogburn, D.L., DeNardis, L., Levinson, N.S. (dir.): The Turn to Infrastructure in Internet Governance. Palgrave Macmillan, Basingstoke (2016)","DOI":"10.1057\/9781137483591"},{"issue":"2","key":"22_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/606272.606298","volume":"46","author":"PE Agre","year":"2003","unstructured":"Agre, P.E.: P2P and the promise of internet equality. Commun. ACM 46(2), 39\u201342 (2003)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Internet Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45982-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T18:45:45Z","timestamp":1568313945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45982-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459813","9783319459820"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45982-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}