{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:03:04Z","timestamp":1705964584830},"reference-count":10,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2017,1,2]]},"DOI":"10.1080\/01611194.2015.1135487","type":"journal-article","created":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T17:41:58Z","timestamp":1462988518000},"page":"29-54","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario"],"prefix":"10.1080","volume":"41","author":[{"given":"Alan T.","family":"Sherman","sequence":"first","affiliation":[]},{"given":"John","family":"Seymour","sequence":"additional","affiliation":[]},{"given":"Akshayraj","family":"Kore","sequence":"additional","affiliation":[]},{"given":"William","family":"Newton","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_22"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48892-8_26"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0024447"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02002-5_5"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_41"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Drago, I., Mellia, M., Munaf\u00f2, M. M., Sperotto, A., Sadre, R., and Pras, A. 2012. Inside Dropbox: Understanding personal cloud storage services, In:Proceedings of the 2012 ACM Conference on Internet Measurement (IMC \u201912).Boston, MA ACM.","DOI":"10.1145\/2398776.2398827"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0017-4"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806125"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358053"},{"key":"CIT0024","volume-title":"Advances in Cryptology: CRYPTO 2005.","author":"Vaudenay S.","year":"1995"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2015.1135487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:26:14Z","timestamp":1498310774000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2015.1135487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,11]]},"references-count":10,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,11,28]]},"published-print":{"date-parts":[[2017,1,2]]}},"alternative-id":["10.1080\/01611194.2015.1135487"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2015.1135487","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}