{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:17:37Z","timestamp":1648599457910},"reference-count":8,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1990,7,1]],"date-time":"1990-07-01T00:00:00Z","timestamp":646790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1990,7]]},"DOI":"10.1016\/0140-3664(90)90057-n","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"347-353","source":"Crossref","is-referenced-by-count":0,"title":["Network management issues in support of X.32 services"],"prefix":"10.1016","volume":"13","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(90)90057-N_BIB1","volume":"Vol. VIII","year":"1984"},{"key":"10.1016\/0140-3664(90)90057-N_BIB2","series-title":"CCITT recommendation X.32: DTE-DCE interface for packet-mode terminals accessing a packet switched public data network through a public switched telephone network or a circuit switched public data network or an intergrated services digital network","year":"1988"},{"key":"10.1016\/0140-3664(90)90057-N_BIB3","series-title":"Security mechanisms for computer networks","author":"Muftic","year":"1988"},{"issue":"No 2","key":"10.1016\/0140-3664(90)90057-N_BIB4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"Vol 21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"issue":"No 12","key":"10.1016\/0140-3664(90)90057-N_BIB5","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"Vol 21","author":"Needham","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(90)90057-N_BIB6","series-title":"\u2018Information processing systems \u2014 open systems interconnection reference model, part 2: security architecture\u2019 ISO IS 7498-2","year":"1988"},{"key":"10.1016\/0140-3664(90)90057-N_BIB7","series-title":"\u2018The directory \u2014 authentication framework, CCITT draft recommendation X.509 (version 7)\u2019 ISO IS 9594-8","year":"1988"},{"key":"10.1016\/0140-3664(90)90057-N_BIB8","series-title":"\u2018The directory \u2014 models, CCITT draft recommendation X.509 (version 8)\u2019 ISO IS 9594-2","year":"1988"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090057N?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090057N?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:28:45Z","timestamp":1552638525000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014036649090057N"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,7]]},"references-count":8,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1990,7]]}},"alternative-id":["014036649090057N"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(90)90057-n","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1990,7]]}}}