{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:46:27Z","timestamp":1747169187366,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/iscc.2004.1358430","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:02Z","timestamp":1103776442000},"page":"357-362 Vol.1","source":"Crossref","is-referenced-by-count":2,"title":["Protecting integrity and confidentiality for data communication"],"prefix":"10.1109","author":[{"family":"Fangyong Hou","sequence":"first","affiliation":[{"name":"Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China"}]},{"family":"Zhiying Wang","sequence":"additional","affiliation":[{"name":"Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China"}]},{"family":"Yuhua Tang","sequence":"additional","affiliation":[{"name":"Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China"}]},{"family":"Zhen Liu","sequence":"additional","affiliation":[{"name":"Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China"}]}],"member":"263","reference":[{"key":"ref4","first-page":"12","article-title":"Chaffing and winnowing: Confidentiality without encryption","volume":"4","author":"rivest","year":"1998","journal-title":"CryptoBytes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_22"},{"article-title":"RFC 3174: US Secure Hash Algorithm 1 (SHAI)","year":"0","author":"eastlake","key":"ref10"},{"key":"ref6","article-title":"Forward integrity for secure audit logs","author":"bellare","year":"1997","journal-title":"Technical Report"},{"journal-title":"SSL 3 0 specification","year":"0","key":"ref11"},{"key":"ref5","article-title":"Hardware Mechanisms for Memory Integrity Checking","author":"edward suh","year":"2002","journal-title":"Technical report MIT-LCS-TR-872"},{"journal-title":"Kerberos The Network Authentication Protocol","year":"0","key":"ref12"},{"key":"ref8","first-page":"147","article-title":"Secure Recording of Itineraries Through Cooperating Agents","author":"roth","year":"1998","journal-title":"ECOOP 98 Workshop on 4th Workshop on Mobile Object Systems Secure Internet Mobile Computations"},{"key":"ref7","first-page":"64","article-title":"Detecting Attacks on Mobile Agents","author":"catherine","year":"1997","journal-title":"DARPA Workshop on Foundations for Secure Mobile Code"},{"article-title":"AES Proposal: Rijndael","year":"0","author":"daemen","key":"ref2"},{"article-title":"RFC 1321: The MD5 Message-Digest Algorithm","year":"0","author":"rivest","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1979.6368160"}],"event":{"name":"Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications","start":{"date-parts":[[2004,7,28]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2004,7,1]]}},"container-title":["Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9388\/29803\/01358430.pdf?arnumber=1358430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T13:46:56Z","timestamp":1709905616000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1358430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscc.2004.1358430","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}