{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:25:05Z","timestamp":1714940705220},"reference-count":4,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046380","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:20:59Z","timestamp":1469719259000},"page":"2256-2261","source":"Crossref","is-referenced-by-count":0,"title":["Physical Layer Security: Networks"],"prefix":"10.1081","author":[{"given":"Matthew J.","family":"Decker","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"p_2","volume-title":"data management policy"},{"key":"p_9","volume-title":"it depends"},{"key":"p_10","volume-title":"MD 20755-6000)"},{"key":"p_14","volume-title":"MD 20755-6000)"}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T10:27:32Z","timestamp":1473503252000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":4,"alternative-id":["10.1081\/E-EIA-120046380","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046380","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}