{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:29:48Z","timestamp":1773322188286,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859787","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1405-1410","source":"Crossref","is-referenced-by-count":2,"title":["Secure and privacy-enhanced e-mail system based on the concept of proxies"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Kounelis","sequence":"first","affiliation":[]},{"given":"Sead","family":"Muftic","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Loschner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"57","author":"jammalamadaka","year":"2006","journal-title":"Delegate A Proxy Based Architecture for Secure Website Access from An Untrusted Machine"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199910)29:12<1049::AID-SPE271>3.0.CO;2-1"},{"key":"10","year":"0","journal-title":"OnePKI-Public Key Infrastructure"},{"key":"1","first-page":"1479","article-title":"Security of service requests for cloud based m-commerce","author":"kounelis","year":"2012","journal-title":"2012 Proceedings of the 35th International Convention MIPRO MIPRO"},{"key":"7","author":"bishop","year":"2003","journal-title":"Computer Security Art and Science"},{"key":"6","year":"0","journal-title":"Gmail S\/MIME"},{"key":"5","year":"0"},{"key":"4","first-page":"1","article-title":"CryptoNET: Design and implementa-tion of the Secure Email System","author":"ghafoor","year":"2009","journal-title":"2009 Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN)"},{"key":"9","year":"0","journal-title":"OneSDK-Java Security Platform"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2013.10"},{"key":"11","article-title":"The NSA files","year":"0","journal-title":"The Guardian"},{"key":"12","year":"0"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2014,5,26]]},"end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859787.pdf?arnumber=6859787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:59:44Z","timestamp":1490284784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859787","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}