{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:42:44Z","timestamp":1765039364490},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_29","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"260-267","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["End to End Security is Not Enough"],"prefix":"10.1007","author":[{"given":"Dylan","family":"Clarke","sequence":"first","affiliation":[]},{"given":"Syed Taha","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"29_CR1","unstructured":"Barrett, B.: Don\u2019t let Wikileaks scare you off signal and other encrypted chat apps. Wired, 7 March 2017. \nhttps:\/\/www.wired.com\/2017\/03\/wikileaks-cia-hack-signal-encrypted-chat-apps\/"},{"key":"29_CR2","unstructured":"ProtonMail: Secure email based in Switzerland. \nhttps:\/\/www.protonmail.com"},{"key":"29_CR3","unstructured":"Mega. \nhttps:\/\/www.mega.nz"},{"key":"29_CR4","unstructured":"Ali, S.T., Murray, J.: An overview of end-to-end verifiable voting systems. In: Real-World Electronic Voting: Design, Analysis and Deployment, pp. 171\u2013218. CRC Press (2016)"},{"key":"29_CR5","unstructured":"Greenberg, A.: Researchers warn: Mega\u2019s new encrypted cloud doesn\u2019t keep its megasecurity promises. Forbes, 21 January 2013. \nhttps:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/01\/21\/researchers-warn-megas-new-encrypted-cloud-cant-keep-its-megasecurity-promises\/#6e4b540150f1"},{"key":"29_CR6","unstructured":"Fox-Brewster, T.: Watch as Hackers Hijack WhatsApp Accounts Via Critical Telecoms Flaws. Forbes, 1 June 2016. \nhttps:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/06\/01\/whatsapp-telegram-ss7-hacks\/#39455d21178b"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy 2004, pp. 27\u201340. IEEE (2004)","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"29_CR8","unstructured":"Bendel, M.: Hackers describe PS3 security as epic fail, gain unrestricted access. Exophase, 29 December 2010. \nhttps:\/\/www.exophase.com\/20540\/hackers-describe-ps3-security-as-epic-fail-gain-unrestricted-access\/"},{"key":"29_CR9","unstructured":"Shu, C.: Confirmed: Snapchat Hack Not a Hoax, 4.6M Usernames and Numbers Published. TechCrunch, 21 December 2013. \nhttps:\/\/techcrunch.com\/2013\/12\/31\/hackers-claim-to-publish-list-of-4-6m-snapchat-usernames-and-numbers\/"},{"key":"29_CR10","unstructured":"Lomas, N.: We want to limit use of e2e encryption, confirms UK minister. TechCrunch, 5 June 2017. \nhttps:\/\/techcrunch.com\/2017\/06\/05\/we-want-to-limit-use-of-e2e-encryption-confirms-uk-minister\/"},{"key":"29_CR11","unstructured":"Ganguly, M.: WhatsApp vulnerability allows snooping on encrypted messages. The Guardian, 13 January 2017. \nhttps:\/\/www.theguardian.com\/technology\/2017\/jan\/13\/whatsapp-backdoor-allows-snooping-on-encrypted-messages"},{"key":"29_CR12","unstructured":"Goodin, D.: Think your Skype Messages Get End to End Encryption? Think Again. Ars Technica, 20 May 2013. \nhttp:\/\/arstechnica.com\/security\/2013\/05\/think-your-skype-messages-get-end-to-end-encryption-think-again"},{"key":"29_CR13","unstructured":"Menn, J.: NSA infiltrated RSA security more deeply than thought. Reuters, 31 June 2014. \nhttp:\/\/www.reuters.com\/article\/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331"},{"issue":"1","key":"29_CR14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MSP.2010.144","volume":"9","author":"B Stone-Gross","year":"2011","unstructured":"Stone-Gross, B., Cova, M., Gilbert, B., Kemmerer, R., Kruegel, C., Vigna, G.: Analysis of a botnet takeover. IEEE Secur. Priv. 9(1), 64\u201372 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"29_CR15","unstructured":"Welch, C.: Google encrypts Gmail between data centers to keep the NSA out of your inbox. The Verge, 20 March 2014. \nhttps:\/\/www.theverge.com\/2014\/3\/20\/5530072\/google-encrypts-gmail-between-data-centers-to-keep-out-nsa"},{"key":"29_CR16","unstructured":"BI Intelligence: Apple is still struggling to keep fake apps out of the App Store. Business Insider, 11 November 2016. \nhttp:\/\/www.businessinsider.com\/apple-still-struggling-to-keep-fake-apps-out-of-the-app-store-2016-11"},{"key":"29_CR17","unstructured":"Turton, W.: Why you Should Stop using Telegram Right now. Gizmodo, 24 June 2016. \nhttp:\/\/gizmodo.com\/why-you-should-stop-using-telegram-right-now-1782557415"},{"key":"29_CR18","unstructured":"Lerner, A.A., Zeng, E., Roesner, F.: Confidante: usable encrypted email. In: IEEE Euro S&P (2016)"},{"key":"29_CR19","unstructured":"Mailvelope. \nhttps:\/\/www.mailvelope.com\/en\/"},{"key":"29_CR20","unstructured":"Bell, S., Benaloh, J., Byrne, M.D., DeBeauvoir, D., Eakin, B., Fisher, G., Kortum, P., McBurnett, N., Montoya, J., Parker, M., et al.: Star-vote: a secure, transparent, auditable and reliable voting system. In: Real-World Electronic Voting: Design, Analysis and Deployment, pp. 375\u2013404. CRC Press (2016)"},{"key":"29_CR21","unstructured":"Braun, U., Shinnar, A., Seltzer, M.I.: Securing provenance. In: HotSec (2008)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:43:37Z","timestamp":1511873017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}