{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:45:35Z","timestamp":1743151535660,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494654"},{"type":"electronic","value":"9783319494661"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49466-1_7","type":"book-chapter","created":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T06:50:07Z","timestamp":1478933407000},"page":"90-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Whitelisting of Instant Messages"],"prefix":"10.1007","author":[{"given":"G\u00fcnter","family":"Fahrnberger","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"van den Berg, B.: Colouring inside the lines: using technology to regulate childrens behaviour online. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 67\u201385. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_4","DOI":"10.1007\/978-94-6265-005-3_4"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"van den Berg, B.: Regulating online child safety: introduction. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 1\u201316. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_1","DOI":"10.1007\/978-94-6265-005-3_1"},{"key":"7_CR3","unstructured":"Boss, G., McConnell, K.C.: System and method for filtering instant messages by context, US Patent App. 10\/356,100. \n                    https:\/\/www.google.com\/patents\/US20040154022"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917\u2013922, June 2012. doi:\n                    10.1109\/ICC.2012.6364125","DOI":"10.1109\/ICC.2012.6364125"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Ciavarella, R., de Terwangne, C.: Online social networks and young peoples privacy protection: the role of the right to be forgotten. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 157\u2013171. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_9","DOI":"10.1007\/978-94-6265-005-3_9"},{"key":"7_CR6","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, New York (2001)"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Fahrnberger, G.: Computing on encrypted character strings in clouds. In: Hota, C., Srimani, P.K. (eds.) Distributed Computing and Internet Technology. LNCS, vol. 7753, pp. 244\u2013254. Springer, Heidelberg (2013). doi:\n                    10.1007\/978-3-642-36071-8_19","DOI":"10.1007\/978-3-642-36071-8_19"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Fahrnberger, G.: Securestring 2.0 - a cryptosystem for computing on encrypted character strings in clouds. In: Eichler, G., Gumzej, R. (eds.) Networked Information Systems. Fortschritt-Berichte Reihe 10, vol. 826, pp. 226\u2013240. VDI D\u00fcsseldorf, June 2013. doi:\n                    10.13140\/RG.2.1.4846.7521\/3","DOI":"10.13140\/RG.2.1.4846.7521\/3"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-04483-5_25","volume-title":"Distributed Computing and Internet Technology","author":"G Fahrnberger","year":"2014","unstructured":"Fahrnberger, G.: A second view on securestring 2.0. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 239\u2013250. Springer, Heidelberg (2014). doi:\n                    10.1007\/978-3-319-04483-5_25"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Fahrnberger, G.: SIMS: a comprehensive approach for a secure instant messaging sifter. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 164\u2013173, September 2014. doi:\n                    10.1109\/TrustCom.2014.25","DOI":"10.1109\/TrustCom.2014.25"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-14977-6_26","volume-title":"Distributed Computing and Internet Technology","author":"G Fahrnberger","year":"2015","unstructured":"Fahrnberger, G.: Repetition pattern attack on multi-word-containing securestring 2.0 objects. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 265\u2013277. Springer, Heidelberg (2015). doi:\n                    10.1007\/978-3-319-14977-6_26"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Fahrnberger, G.: A detailed view on securestring 3.0. In: Chakrabarti, A., Sharma, N., Balas, V.E. (eds.) Advances in Computing Applications. Springer, Singapore, November 2016. doi:\n                    10.1007\/978-981-10-2630-0_7","DOI":"10.1007\/978-981-10-2630-0_7"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-319-14977-6_33","volume-title":"Distributed Computing and Internet Technology","author":"G Fahrnberger","year":"2015","unstructured":"Fahrnberger, G., Heneis, K.: Securestring 3.0 - a cryptosystem for blind computing on encrypted character strings. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 331\u2013334. Springer, Heidelberg (2015). doi:\n                    10.1007\/978-3-319-14977-6_33"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Fahrnberger, G., Nayak, D., Martha, V.S., Ramaswamy, S.: Safechat: a tool to shield children\u2019s communication from explicit messages. In: 2014 14th International Conference on Innovations for Community Services (I4CS), pp. 80\u201386, June 2014. doi:\n                    10.1109\/I4CS.2014.6860557","DOI":"10.1109\/I4CS.2014.6860557"},{"key":"7_CR15","volume-title":"Practical Cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)"},{"key":"7_CR16","unstructured":"Ganz, H., Borst, K.J.: Multiple-layer chat filter system and method, US Patent 8,316,097. \n                    https:\/\/www.google.com\/patents\/US8316097"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Genner, S.: Violent video games and cyberbullying: why education is better than regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 229\u2013243. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_13","DOI":"10.1007\/978-94-6265-005-3_13"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"van der Hof, S.: No childs play: online data protection for children. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 127\u2013141. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_7","DOI":"10.1007\/978-94-6265-005-3_7"},{"key":"7_CR19","unstructured":"ISO, IEC 10116:2006: Information technology - security techniques - modes of operation for an n-bit block cipher. International Organization for Standardization, February 2006. \n                    https:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=38761"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"van der Knaap, L.M., Cuijpers, C.: Regulating online sexual solicitation: towards evidence-based policy and regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 265\u2013281. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_15","DOI":"10.1007\/978-94-6265-005-3_15"},{"key":"7_CR21","unstructured":"Landsman, R.: Filter for instant messaging, US Patent Ap. 11\/252,664. \n                    https:\/\/www.google.com\/patents\/US20070088793"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Lievens, E.: Children and peer-to-peer risks in social networks: regulating, empowering or a little bit of both? In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 191\u2013209. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_11","DOI":"10.1007\/978-94-6265-005-3_11"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Liu, Z., Lin, W., Li, N., Lee, D.: Detecting and filtering instant messaging spam - a global and personalized approach. In: 1st IEEE ICNP Workshop on Secure Network Protocols, (NPSec), pp. 19\u201324, November 2005. doi:\n                    10.1109\/NPSEC.2005.1532048","DOI":"10.1109\/NPSEC.2005.1532048"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Miller, G.A.: Wordnet: a lexical database for english. Commun. ACM 38(11), 39\u201341 (1995). doi:\n                    10.1145\/219717.219748","DOI":"10.1145\/219717.219748"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Notten, N.: Taking risks on the world wide web: the impact of families and societies on adolescents risky online behavior. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 105\u2013123. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_6","DOI":"10.1007\/978-94-6265-005-3_6"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"\u00d6rencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119\u2013160 (2014). doi:\n                    10.1007\/s10619-013-7123-9","DOI":"10.1007\/s10619-013-7123-9"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Sonck, N., de Haan, J.: Safety by literacy? rethinking the role of digital skills in improving online safety. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 89\u2013104. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_5","DOI":"10.1007\/978-94-6265-005-3_5"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Stebila, D., Green, J.: Elliptic curve algorithm integration in the secure shell transport layer. RFC 5656 (Proposed Standard), December 2009. \n                    https:\/\/www.ietf.org\/rfc\/rfc5656.txt","DOI":"10.17487\/rfc5656"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Thierer, A.: A framework for responding to online safety risks. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 39\u201366. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_3","DOI":"10.1007\/978-94-6265-005-3_3"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Vandebosch, H.: Addressing cyberbullying using a multi-stakeholder approach: the flemish case. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 245\u2013262. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_14","DOI":"10.1007\/978-94-6265-005-3_14"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 173\u2013188, May 2010. doi:\n                    10.1109\/SP.2010.19","DOI":"10.1109\/SP.2010.19"},{"key":"7_CR32","doi-asserted-by":"publisher","unstructured":"van der Zwaan, J.M., Dignum, V., Jonker, C.M., van der Hof, S.: On technology against cyberbullying. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 211\u2013228. T.M.C. Asser Press, March 2014. doi:\n                    10.1007\/978-94-6265-005-3_12","DOI":"10.1007\/978-94-6265-005-3_12"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49466-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T08:10:02Z","timestamp":1558512602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49466-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494654","9783319494661"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49466-1_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"13 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations for Community Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i4cs2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/i4cs-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}