{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:28:27Z","timestamp":1725618507843},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604059","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T18:59:49Z","timestamp":1287514789000},"page":"191-196","source":"Crossref","is-referenced-by-count":1,"title":["Extending the definition of guesswork"],"prefix":"10.1109","author":[{"given":"Reine","family":"Lundin","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Lindskog","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824921"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"journal-title":"Ciphers and Their Products Group Theory in Private Key Cryptography","year":"1999","author":"pliam","key":"ref13"},{"journal-title":"Claude Elwood Shannon Collected Papers","year":"1993","author":"shannon","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719036"},{"journal-title":"Modern Algebra&#x2014 An Introduction","year":"1992","author":"durbin","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013283"},{"journal-title":"Software Metrics A Rigorous and Practical Approach","year":"1997","author":"fenton","key":"ref5"},{"key":"ref8","first-page":"145","article-title":"Adding security to QoS architectures","author":"lindskog","year":"2003","journal-title":"Perspectives on Multimedia Communication Media and Information Technology"},{"journal-title":"Security Metrics Replacing Fear Uncertainty and Doubt","year":"2007","author":"jaquith","key":"ref7"},{"journal-title":"CCIMB Common Criteria for Information Technology Security Evaluation Common Criteria Implementation Board","year":"2006","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.481781"},{"key":"ref9","article-title":"On the relationship between confidentiality measures: Entropy and guesswork","author":"lundin","year":"2007","journal-title":"Proceedings of the 5th International Workshop on Security in Information Systems (WOSIS 2007)"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604059.pdf?arnumber=5604059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T05:07:09Z","timestamp":1489900029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604059","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}