{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:49:10Z","timestamp":1725889750737},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611174"},{"type":"electronic","value":"9783319611181"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61118-1_6","type":"book-chapter","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T05:35:42Z","timestamp":1497418542000},"page":"40-46","source":"Crossref","is-referenced-by-count":0,"title":["Online Conversation Application with Confidentiality, Anonymity, and Identity Requirements"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,15]]},"reference":[{"key":"6_CR1","unstructured":"Calderbank, M.: The RSA Cryptosystem: History, Algorithm, Primes (2007)"},{"key":"6_CR2","unstructured":"Demircioglu, M., Task\u0131n, H.K., Sar\u0131murat, S.: Security analysis of the encrypted mobile communication applications (2014)"},{"key":"6_CR3","unstructured":"Electronic Frontier Foundation: Secure messaging scorecard. Which apps and tools actually keep your messages safe?. Accessed 11 Sept 2016"},{"key":"6_CR4","unstructured":"Electronic Frontier Foundation, Julia, A., Joseph, B.: Secure Messaging Scorecard. \nhttps:\/\/www.eff.org\/secure-messaging-scorecard\n\n (2014)"},{"key":"6_CR5","unstructured":"Gaurav, R.: How WhatsApp Works. \nhttp:\/\/digitalperiod.com\/explore-whatsapp-clock-sign-and-tick\/\n\n (2015)"},{"key":"6_CR6","unstructured":"Greenberg, A.: Hacker Lexicon: What Is End-to-End Encryption?. In: WIRED (2015). Accessed 17 Mar 2016"},{"key":"6_CR7","unstructured":"Inc, W.: How Wickr\u2019s Encryption Works. \nhttps:\/\/www.wickr.com\/security\/how-it-works\n\n. Accessed 17 Feb 2016"},{"key":"6_CR8","unstructured":"Pedersen, C., Dahl, D.: Crypton: Zero-Knowledge Application Framework (2014). Accessed 2 Mar 2016"},{"key":"6_CR9","unstructured":"Play, G.: TextSecure Private Messenger. Accessed 17 Feb 2016"},{"key":"6_CR10","unstructured":"Sun, L.: Facebook Inc.\u2019s WhatsApp Hits 900 Million Users: What Now?. The Motley Fool. \nhttp:\/\/www.fool.com\/investing\/general\/2015\/09\/11\/facebook-incs-whatsapp-hits-900-million-users-what.aspx\n\n (2015)"},{"key":"6_CR11","unstructured":"Systems, O.W.: Advanced cryptographic ratcheting. \nhttps:\/\/whispersystems.org\/blog\/advanced-ratcheting\/\n\n. Accessed 28 Sept 2016"},{"key":"6_CR12","unstructured":"Tactical Technology Collective and Front Line Defenders: TextSecure for Android, security in-a-box. \nhttps:\/\/securityinabox.org\/en\/guide\/textsecure\/android\n\n (2009)"},{"key":"6_CR13","unstructured":"TechCrunch. AOL: Talk Private to Me: Free, Worldwide, Encrypted Voice Calls with Signal for iPhone. Accessed 13 Sept 2016"},{"key":"6_CR14","unstructured":"Telegram: Mtproto mobile protocol"},{"key":"6_CR15","unstructured":"The Zfone Project: Exactly how does Zfone and ZRTP protect against a man-in-the-middle (MiTM) attack?. Accessed 13 Sept 2016"},{"key":"6_CR16","unstructured":"Threema GmbH: Threema"},{"key":"6_CR17","unstructured":"Threema GmbH: Threema Cryptography Whitepaper. \nhttps:\/\/threema.ch\/en\/faq\n\n. Accessed 10 Sept 2016"},{"key":"6_CR18","unstructured":"Tilman, F., Christian, M., Christoph, B., Florian, B., Jorg, S., Thorsten, H.: How Secure is TextSecure? (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Ambient Intelligence\u2013 Software and Applications \u2013 8th International Symposium on Ambient Intelligence (ISAmI 2017)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61118-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T05:37:02Z","timestamp":1497418622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61118-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611174","9783319611181"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61118-1_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}