{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T08:29:44Z","timestamp":1648628984370},"reference-count":13,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)88290-9","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:00:05Z","timestamp":1027652405000},"page":"115-125","source":"Crossref","is-referenced-by-count":0,"title":["The puzzle theorem \u2014 The less I know, the less I can disclose\u2026"],"prefix":"10.1016","volume":"16","author":[{"given":"Stephane G.","family":"Bouniol","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)88290-9_BIB1","unstructured":"B. Cheswick, \u201cThe design of Internet gateway\u201d, AT&T Bell Laboratories An example of Gateway building, and general security consistency."},{"key":"10.1016\/S0167-4048(97)88290-9_BIB2_1","series-title":"Proc. Of the 2nd ACM Conference on Computer and Communication Security","first-page":"68","article-title":"Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart","author":"Reiter","year":"1996"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB3_1","series-title":"Proc. Of the IEEE Symposium on research in Security and Privacy","first-page":"110","article-title":"Intrusion Tolerance in Distributed Computing System","author":"Deswarte","year":"1991"},{"issue":"numero 4","key":"10.1016\/S0167-4048(97)88290-9_BIB4_1","first-page":"405","article-title":"Tolerance aux fautes et securite par fragmentation, redondance, dissemination","volume":"volume 15","author":"Fabre","year":"1996","journal-title":"TSI"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB5_1","first-page":"180","article-title":"Fault and Intrusion Tolerance in Object-Oriented Systems","author":"Randell","year":"1991"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB6_1","series-title":"Project Athena Technical Plan","article-title":"Kerberos Authentication and Authorization System","author":"Miller","year":"1991"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB7","unstructured":"J. T. Kohl, T. T, B. C. Neuman, \u201cThe evolution of the Kerberos Authentication Service\u201d, paper presented at the Spring 1991 EurOpen Conf. This paper presents the differences between versions 4 and 5 of Kerberos."},{"key":"10.1016\/S0167-4048(97)88290-9_BIB8_1","article-title":"Kerberos V5 Implementer\u00c6s Guide","year":"1996"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB9_1","article-title":"Limitations of the Kerberos Authentication System","author":"Merritt","year":"1990"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB10","series-title":"La vie mode d\u00c6emploi","author":"Perec","year":"1978"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB11_1","series-title":"Unix Password Security","author":"Belgers","year":"1978"},{"key":"10.1016\/S0167-4048(97)88290-9_BIB12","unstructured":"D. K. Jess, D. R. Stafford, U. W. Pooch, \u201cA Unix Network Protocol Study: Network Information Service\u201d, Texas A&M University. A good example of unsecure application."},{"key":"10.1016\/S0167-4048(97)88290-9_BIB13_1","series-title":"A simple Active Attack Against TCP","author":"Joncheray","year":"1995"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897882909?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897882909?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:53:53Z","timestamp":1555203233000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404897882909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0167404897882909"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)88290-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}