{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:27Z","timestamp":1758845127988},"reference-count":17,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1996,5,1]],"date-time":"1996-05-01T00:00:00Z","timestamp":830908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1996,5]]},"DOI":"10.1016\/0140-3664(95)01031-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:03:07Z","timestamp":1027609387000},"page":"379-388","source":"Crossref","is-referenced-by-count":7,"title":["Security in computer networks and distributed systems"],"prefix":"10.1016","volume":"19","author":[{"given":"Mukesh M.","family":"Prabhu","sequence":"first","affiliation":[]},{"given":"S.V.","family":"Raghavan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(95)01031-9_BIB1","article-title":"Open Systems Interconnection Reference Model, Part 1: Basic Reference Model","author":"ISO Information Processing Systems","year":"1984","journal-title":"ISO DIS 7498-1"},{"key":"10.1016\/0140-3664(95)01031-9_BIB2","article-title":"Open Systems Interconnection Reference Model, Part 2: Security Architecture","author":"ISO Information Processing Systems","year":"1988","journal-title":"ISO DIS 7498-2"},{"key":"10.1016\/0140-3664(95)01031-9_BIB3","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.FIPS.79","author":"National Bureau of Standards Data Encryption Standard","year":"1977","journal-title":"Federal Information Processing Standards Publication 46"},{"key":"10.1016\/0140-3664(95)01031-9_BIB4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0140-3664(95)01031-9_BIB5","series-title":"Technical Report 83","article-title":"Authentication in distributed systems: theory and practice","author":"Lampson","year":"1992"},{"key":"10.1016\/0140-3664(95)01031-9_BIB6","series-title":"Technical Report 1320","article-title":"The MD4 message digest algorithm","author":"Rivest","year":"1992"},{"key":"10.1016\/0140-3664(95)01031-9_BIB7","series-title":"Technical Report 1321","article-title":"The MD5 message digest algorithm","author":"Rivest","year":"1992"},{"year":"1984","series-title":"Security for Computer Networks","author":"Davies","key":"10.1016\/0140-3664(95)01031-9_BIB8"},{"key":"10.1016\/0140-3664(95)01031-9_BIB9","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large network of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Comm. ACM"},{"volume":"Vol VII","year":"1989","series-title":"CCITT The Directory \u2014 Overview of Concepts, Models and Services","key":"10.1016\/0140-3664(95)01031-9_BIB10"},{"volume":"Vol VII","year":"1989","series-title":"CCITT The Directory \u2014 Part 8: Authentication Framework","key":"10.1016\/0140-3664(95)01031-9_BIB11"},{"key":"10.1016\/0140-3664(95)01031-9_BIB12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"10.1016\/0140-3664(95)01031-9_BIB13","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/378570.378623","article-title":"Security defects in CCITT recommendation X.509 \u2014 the directory authentication frame work","volume":"20","author":"I'Anson","year":"1990","journal-title":"ACM Comput. Comm. Rev."},{"key":"10.1016\/0140-3664(95)01031-9_BIB14","series-title":"Technical report","article-title":"Kerberos: an authentication service for open network systems: Project Athena","author":"Steiner","year":"1988"},{"key":"10.1016\/0140-3664(95)01031-9_BIB15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/381906.381946","article-title":"Limitations of the Kerberos authentication system","volume":"20","author":"Bellovin","year":"1990","journal-title":"Comput. Comm. Rev."},{"key":"10.1016\/0140-3664(95)01031-9_BIB16","series-title":"PhD thesis","article-title":"Open systems security \u2014 an architectural frame work","author":"Karilla","year":"1990"},{"key":"10.1016\/0140-3664(95)01031-9_BIB17","unstructured":"M.M. Prabhu and S.V. Raghavan, \u2018Design and implementation of security shell for OSInet\u2019, Defense Sci. J. (communicated)."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366495010319?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366495010319?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T19:58:50Z","timestamp":1579031930000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366495010319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,5]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1996,5]]}},"alternative-id":["0140366495010319"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(95)01031-9","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[1996,5]]}}}