{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:50:32Z","timestamp":1752360632639},"reference-count":14,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1998,1]]},"DOI":"10.1016\/s0167-4048(98)80094-1","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"543-551","source":"Crossref","is-referenced-by-count":6,"title":["A confused document encrypting scheme and its implementation"],"prefix":"10.1016","volume":"17","author":[{"family":"Chu-Hsing Lin","sequence":"first","affiliation":[]},{"family":"Tien-Chi Lee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(98)80094-1_BIB1","first-page":"8","article-title":"Decrypted Secrets: Methods and Maxims of Cryptology","author":"Bauer","year":"1997"},{"issue":"2","key":"10.1016\/S0167-4048(98)80094-1_BIB2","first-page":"93","article-title":"Data encryption: a non-mathematical approach\u2014Part 5","volume":"14","author":"Highland","year":"1995","journal-title":"Computers and Security"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB3","first-page":"xiii","article-title":"The Codebreakers","author":"Kahn","year":"1968"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB4","series-title":"Proceedings of Enrocrypt '90","first-page":"389","article-title":"A proposal for a new block encryption standard","author":"Lai","year":"1991"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB5","article-title":"Specifications for the IDEA Chip","author":"Curiger","year":"1992"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB6","series-title":"The Data Encryption Standard in Perspective, Computer Security and the Data Encryption Standard","author":"Davis","year":"1978"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB7","year":"1977"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB8","article-title":"Network Security: Private Communication in a Public World","author":"Kaufman","year":"1995","journal-title":"Prentice-Hall Series in Computer Networking and Distributed Systems"},{"issue":"2","key":"10.1016\/S0167-4048(98)80094-1_BIB9","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB10","series-title":"Proceedings of Enrocrypt '88","first-page":"415","article-title":"A new probabilistic encryption scheme","author":"He","year":"1988"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0020-0190(90)90090-K","article-title":"An efficient probabilistic encryption scheme","volume":"34","author":"Hard","year":"1990","journal-title":"Information Processing Letter"},{"issue":"21","key":"10.1016\/S0167-4048(98)80094-1_BIB12","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1049\/el:19890956","article-title":"2-bit, chained, probabilistic encryption scheme","volume":"25","author":"Hard","year":"1989","journal-title":"Electronics Letter"},{"key":"10.1016\/S0167-4048(98)80094-1_BIB13","article-title":"Digital signatures and public-key functions as intractable as factorization","author":"Rabin","year":"1979","journal-title":"MIT Laboratory of Computer Science Technical Report, MIT\/LCS\/TR-212"},{"issue":"1","key":"10.1016\/S0167-4048(98)80094-1_BIB14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/0167-4048(95)00023-2","article-title":"Security classification for documents","volume":"15","author":"Eloff","year":"1996","journal-title":"Computers and Security"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404898800941?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404898800941?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T02:27:26Z","timestamp":1555986446000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404898800941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,1]]},"references-count":14,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1998,1]]}},"alternative-id":["S0167404898800941"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(98)80094-1","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1998,1]]}}}