{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:31:46Z","timestamp":1742938306303,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540732785"},{"type":"electronic","value":"9783540732792"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73279-2_61","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T11:42:46Z","timestamp":1187869366000},"page":"547-552","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis on the Authentication Mechanisms of Korean Popular Messengers"],"prefix":"10.1007","author":[{"given":"Donghwi","family":"Shin","sequence":"first","affiliation":[]},{"given":"Youngsung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Yunho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sangjoon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","unstructured":"NateOn FAQ, \n                    \n                      http:\/\/helpdesk.nate.com\/faq\/"},{"key":"61_CR2","unstructured":"Won, D.: Modern Cryptography (2004)"},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm (1992), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"61_CR4","unstructured":"Korea Information Security Agency (KISA), Private Key Encryption Technique Stndard SEED algorithm [v1.00] (2004)"}],"container-title":["Lecture Notes in Computer Science","Universal Acess in Human Computer Interaction. Coping with Diversity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73279-2_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:03:18Z","timestamp":1582408998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73279-2_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540732785","9783540732792"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73279-2_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}