{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:16:04Z","timestamp":1725459364421},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540530008"},{"type":"electronic","value":"9783540462972"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/bfb0030354","type":"book-chapter","created":{"date-parts":[[2006,1,25]],"date-time":"2006-01-25T15:24:26Z","timestamp":1138202666000},"page":"96-103","source":"Crossref","is-referenced-by-count":0,"title":["KEYMEX: An expert system for the design of key management schemes"],"prefix":"10.1007","author":[{"given":"J. C. A.","family":"van der Lubbe","sequence":"first","affiliation":[]},{"given":"D. E.","family":"Boekee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,18]]},"reference":[{"issue":"2","key":"10_CR1","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/49.17700","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"Identity-based information security management for personal computer networks, E. Okamoto, K. Tanaka, IEEE Selected Areas in Communications, Vol. 7, no 2, February 1989, pp. 290\u2013294","journal-title":"IEEE Selected Areas in Communications"},{"key":"10_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/0167-4048(87)90126-X","volume":"6","author":"D. Longley","year":"1987","unstructured":"Expert Systems applied to the analysis of key management schemes, D. Longley, Computers and Security, 6, 1987, pp. 54\u201367","journal-title":"Computers and Security"},{"issue":"2","key":"10_CR3","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TSE.1987.233151","volume":"SE-13","author":"J.K. Millen","year":"1987","unstructured":"The Interrogator: protocol security analysis, J.K. Millen, S.C. Clark, S.B. Freedman, IEEE Software Eng., Vol. SE-13, no 2, February 1987, pp. 274\u2013288","journal-title":"IEEE Software Eng."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Automated analysis of cryptograms, B.R. Schatz, Cryptologia, April 1977, pp. 116\u2013142","DOI":"10.1080\/0161-117791832869"},{"issue":"4","key":"10_CR5","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/0161-118691861001","volume":"10","author":"J.M. Caroll","year":"1986","unstructured":"The automated analysis of substitution ciphers, J.M. Caroll, L. Robbins, Cryptologia, Vol. 10, no 4, October 1986, pp. 193\u2013209","journal-title":"Cryptologia"},{"issue":"4","key":"10_CR6","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/0161-118791862018","volume":"11","author":"J.M. Caroll","year":"1987","unstructured":"The automated cryptanalysis of polyalphabetic ciphers, J.M. Caroll, L. Robbins, Cryptologia, Vol. 11, no 4, October 1987, pp. 193\u2013205","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '90"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0030354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T14:38:56Z","timestamp":1555425536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0030354"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9783540530008","9783540462972"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0030354","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]}}}