{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T02:40:10Z","timestamp":1744252810184,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_39","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"291-298","source":"Crossref","is-referenced-by-count":0,"title":["Formal Construction of Secure Information Transmission in Office Automation System"],"prefix":"10.1007","author":[{"given":"Xiaole","family":"Li","sequence":"first","affiliation":[]},{"given":"Lianggang","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Jianrong","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yuanlu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Hummel, S.: Network Security Model-Defining an Enterprise Security Strategy, http:\/\/computerdetailreviews.com\/2010\/07\/network-security-model-defining-an-enterprise-security-strategy\/"},{"issue":"1","key":"39_CR2","first-page":"78","volume":"17","author":"E. Ramaraj","year":"2009","unstructured":"Ramaraj, E., Karthikeyan, S., Hemalatha, M.: A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA). International Journal of The Computer\u00a017(1), 78\u201386 (2009)","journal-title":"International Journal of The Computer"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Guttman, J.D.: Security protocol design via authentication tests. In: Proc. the 15th IEEE Computer Security Foundations Workshop, pp. 92\u2013103 (2002)","DOI":"10.1109\/CSFW.2002.1021809"},{"key":"39_CR4","unstructured":"Song, D.: An automatic approach for building secure systems. PhD thesis. University of California at Berkeley, California (2002)"},{"key":"39_CR5","unstructured":"Choi, H.-J.: Security protocol design by composition. PhD thesis. University of Cambridge, Cambridge (2006)"},{"issue":"2","key":"39_CR6","first-page":"548","volume":"7","author":"J. Yang","year":"2011","unstructured":"Yang, J., Cao, T.: A Verifier-based Password-Authenticated Key Exchange Protocol via Elliptic Curves. Journal of Computational Information Systems\u00a07(2), 548\u2013553 (2011)","journal-title":"Journal of Computational Information Systems"},{"issue":"9","key":"39_CR7","first-page":"103","volume":"38","author":"X. Gu","year":"2011","unstructured":"Gu, X., Zhang, Z., Qiu, J.: Research on Wireless Security Protocol Design. Computer Science\u00a038(9), 103\u2013107 (2011)","journal-title":"Computer Science"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T02:17:52Z","timestamp":1744251472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}