{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:40Z","timestamp":1730227180904,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073216","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"1267-1273","source":"Crossref","is-referenced-by-count":0,"title":["Awareness Level Analysis of Public Key Infrastructure Security"],"prefix":"10.1109","author":[{"given":"Esha","family":"Jain","sequence":"first","affiliation":[{"name":"IILM University,School of Management,Gurugram,India"}]},{"given":"Jonika","family":"Lamba","sequence":"additional","affiliation":[{"name":"The NorthCap University,School of Management &#x0026; Liberal Studies,Gurugram,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JIOT.2021.3104010"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s10586-021-03461-7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SmartGridComm.2011.6102327"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.comcom.2022.03.012"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2021.3112013"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s00145-022-09421-7"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.ins.2020.07.025"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1002\/dac.5100"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.jocs.2020.101236"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.cose.2020.102176"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1504\/IJICT.2019.099112"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1049\/cje.2020.05.007"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TCC.2018.2867871"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1186\/s13677-022-00279-5"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1155\/2020\/8889192"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.15388\/20-INFOR415"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.3390\/sym13071144"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TNET.2021.3123507"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TIFS.2020.3035265"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.26599\/BDMA.2020.9020028"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TSC.2018.2789893"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1049\/ise2.12049"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.jisa.2022.103176"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.jisa.2019.102429"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.3390\/s22093498"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.3390\/s21051564"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.3390\/electronics10040391"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.comnet.2021.108443"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.icte.2019.08.002"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1049\/iet-sen.2018.5286"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.3390\/electronics11071083"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MNET.101.2000532"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s10207-019-00430-5"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.jmsy.2021.01.003"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.3390\/s22072484"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/s12599-021-00722-y"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TITS.2020.2981907"},{"volume-title":"Towards a Hybrid Public Key Infrastructure (PKI): A Review","year":"2019","author":"Singh","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.ijinfomgt.2019.04.013"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/950191.950196"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1016\/j.jnca.2022.103345"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.jisa.2022.103134"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.ins.2022.02.027"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/JIOT.2020.3008955"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1186\/s13677-022-00283-9"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.comcom.2022.01.007"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TETC.2017.2759329"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1007\/s11227-021-04193-6"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/MCE.2021.3061808"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/JIOT.2021.3059570"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.51611\/iars.irj.v10i1.2020.106"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.51611\/iars.irj.v11i2.2021.174"},{"issue":"3","key":"ref53","first-page":"6021","article-title":"An Empirical Study on Use of Blockchain Technology as a Support Tool in Economic & Financial Processes","volume":"6","author":"Chavan","year":"2022","journal-title":"Journal of Positive School Psychology"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073216.pdf?arnumber=10073216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T06:10:18Z","timestamp":1710396618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073216","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}