{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:49:46Z","timestamp":1753922986492},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003661","name":"Korea Institute for Advancement of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,17]]},"DOI":"10.1109\/icoin59985.2024.10572205","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T17:25:55Z","timestamp":1720027555000},"page":"807-811","source":"Crossref","is-referenced-by-count":4,"title":["Cyber Attack Defense: DID-based Email Security System"],"prefix":"10.1109","author":[{"given":"Han-Su","family":"Oh","sequence":"first","affiliation":[{"name":"Ajou University,Dept. Cyber Security,Suwon,Republic of Korea"}]},{"given":"Ki-Hyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Ajou University,Dept. Cyber Security,Suwon,Republic of Korea"}]}],"member":"263","reference":[{"article-title":"Decentralized certificate authorities","year":"2017","author":"Jayaraman","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CICN56167.2022.10008382"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.568284"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3446983.3446992"},{"journal-title":"Blockchain based email procedures","author":"Dennis","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03128-9"},{"journal-title":"SQL injection and XSS","author":"Agarwala","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS49979.2021.9432673"}],"event":{"name":"2024 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2024,1,17]]},"location":"Ho Chi Minh City, Vietnam","end":{"date-parts":[[2024,1,19]]}},"container-title":["2024 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10572035\/10572030\/10572205.pdf?arnumber=10572205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T05:50:44Z","timestamp":1720331444000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10572205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icoin59985.2024.10572205","relation":{},"subject":[],"published":{"date-parts":[[2024,1,17]]}}}