{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T09:07:05Z","timestamp":1723885625182},"reference-count":16,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2018,7,4]]},"DOI":"10.1080\/19393555.2018.1516835","type":"journal-article","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T17:54:32Z","timestamp":1536342872000},"page":"205-213","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Key management in tree shaped hierarchies"],"prefix":"10.1080","volume":"27","author":[{"given":"Lanfranco","family":"Lopriore","sequence":"first","affiliation":[{"name":"Dipartimento di Ingegneria dell\u2019Informazione, Universit\u00e0 di Pisa, Pisa, Italy"}]}],"member":"301","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"CIT0003","volume-title":"Cryptographic hash functions: A survey. Technical report, Centre for Computer Security Research, Department of Computer Science","author":"Bakhtiari S.","year":"1995"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0365-5"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.03.019"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2015.03.002"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.02.008"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230489"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90132-D"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.006"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.12.011"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90099-3"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.004"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2018.1516835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T19:52:18Z","timestamp":1541447538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2018.1516835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,4]]},"references-count":16,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,10,9]]},"published-print":{"date-parts":[[2018,7,4]]}},"alternative-id":["10.1080\/19393555.2018.1516835"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2018.1516835","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}