{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:18:38Z","timestamp":1742393918217},"reference-count":25,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2001,9,1]],"date-time":"2001-09-01T00:00:00Z","timestamp":999302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2001,9]]},"DOI":"10.1016\/s0920-5489(01)00077-0","type":"journal-article","created":{"date-parts":[[2002,10,31]],"date-time":"2002-10-31T14:09:39Z","timestamp":1036073379000},"page":"311-324","source":"Crossref","is-referenced-by-count":7,"title":["Towards an open protocol for secure online presence notification"],"prefix":"10.1016","volume":"23","author":[{"given":"A.C.M.","family":"Fong","sequence":"first","affiliation":[]},{"given":"S.C.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"C.T.","family":"Lau","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0920-5489(01)00077-0_BIB1","unstructured":"America Online, AOL Instant Messenger, available online at http:\/\/www.aol.com\/aim, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB2","unstructured":"M. Andreessen, Netscape Communications Corporation's Techvision: Interoperable Security is Arriving, available online at http:\/\/home.netscape.com\/columns\/techvision\/interoperable_security.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB3","unstructured":"Association for Computing Machinery, Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy, available online at http:\/\/info.acm.org\/reports\/acm_crypto_study.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB4","unstructured":"DevEdge Online, Netscape Internet security: Introduction to Public-Key Cryptography, Including Internet Security Issues, available online at http:\/\/developer.netscape.com\/docs\/manuals\/security\/pkin\/index.htm, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB5","unstructured":"IBM T.J. Watson Network Security Group, information available online at http:\/\/www.research.ibm.com\/watson-netsec, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB6","unstructured":"ICQ, ICQ, available online at http:\/\/www.icq.com, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB7","unstructured":"The Institute of Electrical and Electronics Engineers, IEEE P1363 Standard Specifications For Public-Key Cryptography, available online at http:\/\/grouper.ieee.org\/groups\/1363, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB8","unstructured":"Intel Architecture Labs, Intel Open Source Security, available online at http:\/\/developer.intel.com\/ial\/security, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB9","unstructured":"The Internet Security and PKI Application Centre, information available online at http:\/\/inpac.cs.cityu.edu.hk\/, 2001"},{"key":"10.1016\/S0920-5489(01)00077-0_BIB10","unstructured":"The Internet Society, information available online at http:\/\/info.isoc.org, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB11","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1996"},{"key":"10.1016\/S0920-5489(01)00077-0_BIB12","unstructured":"Microsoft, Microsoft NetMeeting, available online at http:\/\/www.microsoft.com\/windows\/netmeeting, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB13","unstructured":"Microsoft, MSN Instant Messenger, available online at http:\/\/messenger.msn.com, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB14","unstructured":"The Mozilla Organization, Open Source Public-Key Infrastructure (PKI) Projects, available online at http:\/\/www.mozilla.org\/crypto-faq.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB15","unstructured":"National Institute of Standards and Technology, Document on Security Protocols (Draft), available online at http:\/\/csrc.ncsl.nist.gov, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB16","unstructured":"National Institute of Standards and Technology, Internetwork Security Protocol, available online at http:\/\/w3.antd.nist.gov\/html\/security.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB17","doi-asserted-by":"crossref","unstructured":"J. Oikarinen, D. Reed, Internet Relay Chat Protocol, RFC1459, available online at http:\/\/www.cis.ohio-state.edu\/htbin\/rfc\/rfc1459.html, 1993.","DOI":"10.17487\/rfc1459"},{"key":"10.1016\/S0920-5489(01)00077-0_BIB18","unstructured":"RSA Data Security, Public-key Encryption, available online at http:\/\/www.rsasecurity.com\/rsalabs\/faq\/2-1-1.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB19","unstructured":"RSA Data Security, RSA Public-Key Cryptography Standards, available online at http:\/\/www.rsasecurity.com\/rsalabs\/pkcs, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB20","series-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"Schneier","year":"1996"},{"key":"10.1016\/S0920-5489(01)00077-0_BIB21","unstructured":"H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, RFC1889, available online at http:\/\/www.cis.ohio-state.edu\/htbin\/rfc\/rfc1889.html, 1996."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB22","unstructured":"SSH Communications Security, Cryptographic Algorithms, available online at http:\/\/www.ssh.fi\/tech\/crypto\/algorithms.html, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB23","unstructured":"Sun Microsystems, Simple Key management for Internet Protocols (SKIP), available online at http:\/\/www.skip.org, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB24","unstructured":"Yahoo!, Yahoo! Instant Messenger, available online at http:\/\/messenger.yahoo.com, 2001."},{"key":"10.1016\/S0920-5489(01)00077-0_BIB25","doi-asserted-by":"crossref","unstructured":"W3 Organization, Security Information, available online at http:\/\/www.w3.org\/Security\/Faq\/wwwsf7.html, 2001.","DOI":"10.1016\/S1361-3723(01)00505-X"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548901000770?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548901000770?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T16:11:30Z","timestamp":1578759090000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548901000770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,9]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,9]]}},"alternative-id":["S0920548901000770"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(01)00077-0","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2001,9]]}}}