{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T02:38:53Z","timestamp":1648521533315},"reference-count":15,"publisher":"Elsevier BV","issue":"16-18","license":[{"start":{"date-parts":[[1998,9,1]],"date-time":"1998-09-01T00:00:00Z","timestamp":904608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1998,9]]},"DOI":"10.1016\/s0169-7552(98)00187-1","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:57:10Z","timestamp":1027652230000},"page":"1521-1529","source":"Crossref","is-referenced-by-count":1,"title":["Privacy protection for public directory services"],"prefix":"10.1016","volume":"30","author":[{"given":"Andreas","family":"Berger","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-7552(98)00187-1_BIB1","doi-asserted-by":"crossref","unstructured":"S.M. Bellovin, M. Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, in: Proc. 1992 IEEE Computer Society Conf. on Research in Security and Privacy, 1992, pp. 72\u201384.","DOI":"10.1109\/RISP.1992.213269"},{"key":"10.1016\/S0169-7552(98)00187-1_BIB2","unstructured":"A. Berger, H. Pagnia, Konzeption eines Firewallsystems f\u00fcr WWW-basierte Informationssysteme, in: Sicherheit in Informationssystemen, Hochschulverlag ETH Z\u00fcrich, Z\u00fcrich, 1998, pp. 275\u2013299."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB3","unstructured":"W.R. Cheswick, S.M. Bellovin, Firewalls and Internet Security, Addison-Wesley, Reading, MA, 1994."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB4","unstructured":"CCITT, The directory, CCITT Recommendation X.500\u2013X.521, 1993."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB5","unstructured":"D. Brent Chapman, E.D. Zwicky, Building Internet Firewalls, O'Reilly, Sebastopol, CA, 1995."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB6","unstructured":"Data Encryption Standard, National Bureau of Standards, Federal Information Processing Standard PUB 46, January 1977."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB7","unstructured":"J. Feigenbaum, E. Grosse, J.A. Reeds, Cryptographic protection of membership lists, Newsletter of the International Association of Cryptologic Research, 9 (1992) 16\u201320."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB8","unstructured":"J. Feigenbaum, M.Y. Liverman, and R.N. Wright, Cryptographic protection of databases and software, in: J. Feigenbaum, M. Merritt (Eds.), Distributed Computing and Cryptography, American Mathematical Society, 1997, pp. 151\u2013172."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB9","unstructured":"G. Good, The LDAP data interchange format (LDIF) \u2013 Technical specification, Internet draft draft-ietf-asid-ldif-02.txt, July 1997."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB10","unstructured":"RSA Laboratories, Public key cryptography standard #5 (PKCS5): Password-based encryption standard, version 1.5, November 1993."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB11","unstructured":"X. Lai, On the design and security of block ciphers, ETH Series in Information Processing, vol. 1, 1992."},{"issue":"11","key":"10.1016\/S0169-7552(98)00187-1_BIB12","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0169-7552(98)00187-1_BIB13","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD5 message digest algorithm, Request for Comments 1321, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/S0169-7552(98)00187-1_BIB14","unstructured":"B. Schneier, Applied Cryptography, 2nd ed., Wiley, New York, 1996."},{"key":"10.1016\/S0169-7552(98)00187-1_BIB15","unstructured":"Proposed federal information processing standard for secure hash standard, Federal Register, vol. 57, no. 21, January 1992."}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169755298001871?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169755298001871?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T02:24:30Z","timestamp":1555208670000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169755298001871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,9]]},"references-count":15,"journal-issue":{"issue":"16-18","published-print":{"date-parts":[[1998,9]]}},"alternative-id":["S0169755298001871"],"URL":"https:\/\/doi.org\/10.1016\/s0169-7552(98)00187-1","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1998,9]]}}}