{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:02:56Z","timestamp":1648663376420},"reference-count":6,"publisher":"Elsevier BV","issue":"2-5","license":[{"start":{"date-parts":[[1993,12,1]],"date-time":"1993-12-01T00:00:00Z","timestamp":754704000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1993,12]]},"DOI":"10.1016\/0165-6074(93)90084-x","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T17:14:48Z","timestamp":1062609288000},"page":"183-186","source":"Crossref","is-referenced-by-count":1,"title":["Certificates handling and their support within X.500 system"],"prefix":"10.1016","volume":"39","author":[{"given":"Denis","family":"Tr\u010dek","sequence":"first","affiliation":[]},{"given":"Borka","family":"Jerman-Bla\u017ei\u010d","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0165-6074(93)90084-X_BIB1","article-title":"Data Encryption Algorithm","author":"American National Standards Institute","year":"1981","journal-title":"ANSI X3.92"},{"key":"10.1016\/0165-6074(93)90084-X_BIB2","article-title":"Information Processing Systems","author":"International Standard Organisation","year":"1988","journal-title":"Open Systems Interconnection Reference Model \u2014 Security Architecture"},{"key":"10.1016\/0165-6074(93)90084-X_BIB3","article-title":"Information technology \u2014 OSI-The Directory","author":"International Standard Organisation","year":"1988"},{"key":"10.1016\/0165-6074(93)90084-X_BIB4","article-title":"Privacy Enhancement for Internet Electronic Mail","author":"Internet Engineering Task Force","year":"1993"},{"issue":"No. 9","key":"10.1016\/0165-6074(93)90084-X_BIB5","first-page":"2","article-title":"1992 Extensions to X.500","volume":"Vol. 6","author":"Radicati","year":"1992","journal-title":"Connexions"},{"issue":"No. 6","key":"10.1016\/0165-6074(93)90084-X_BIB6","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"Vol. IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749390084X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749390084X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T10:26:17Z","timestamp":1551090377000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016560749390084X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,12]]},"references-count":6,"journal-issue":{"issue":"2-5","published-print":{"date-parts":[[1993,12]]}},"alternative-id":["016560749390084X"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(93)90084-x","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1993,12]]}}}