{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T09:25:11Z","timestamp":1743672311747,"version":"3.37.3"},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007655","name":"Czech Technical University in Prague","doi-asserted-by":"publisher","award":["SGS23\/211\/OHK3\/3T\/18"],"award-info":[{"award-number":["SGS23\/211\/OHK3\/3T\/18"]}],"id":[{"id":"10.13039\/100007655","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2206865"],"award-info":[{"award-number":["2206865"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/msec.2024.3449809","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T18:05:21Z","timestamp":1726682721000},"page":"19-29","source":"Crossref","is-referenced-by-count":1,"title":["Adoption Challenges for Cryptographic Protocols"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7610-5963","authenticated-orcid":false,"given":"Konstantin","family":"Fischer","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-6158","authenticated-orcid":false,"given":"Ivana","family":"Trummov\u00e1","sequence":"additional","affiliation":[{"name":"Czech Technical University in Prague, Prague, Czechia"}]},{"given":"Phillip","family":"Gajland","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7167-7383","authenticated-orcid":false,"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5644-3316","authenticated-orcid":false,"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"CISPA-Helmholtz-Center for Information Security, Saarbr&#x00FC;cken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1823-5505","authenticated-orcid":false,"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4135\/9781526405555.n2"},{"key":"ref2","article-title":"On the challenges of bringing cryptography from papers to products: Results from an interview study with experts","volume-title":"Proc. 33rd USENIX Secur. Symp., USENIX Secur.","author":"Fischer","year":"2024"},{"volume-title":"The Menlo report: Ethical principles guiding information and communication technology research","year":"2014","author":"Kenneally","key":"ref3"},{"volume-title":"The moral character of cryptographic work.","year":"2024","author":"Rogaway","key":"ref4"},{"volume-title":"White paper: Multi-device FIDO credentials.","year":"2024","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49100-4_7"},{"key":"ref7","first-page":"169","article-title":"Why Johnny cant encrypt: A usability evaluation of PGP 5.0","volume-title":"Proc. 8th USENIX Secur. Symp.","author":"Whitten","year":"1999"},{"volume-title":"Parakeet: Practical key transparency for end-to-end encrypted messaging.","year":"2024","author":"Malvai","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw55150.2022.00010"},{"volume-title":"Exclusive: Secret contract tied NSA and security industry pioneer.","year":"2024","author":"Menn","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.52"},{"key":"ref13","first-page":"7249","article-title":"You have to read 50 different RFCs that contradict each other: An Interview Study on the Experiences of Implementing Cryptographic Standards","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Huaman","year":"2024"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/10799177\/10682600-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/10799177\/10682600.pdf?arnumber=10682600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:36:19Z","timestamp":1734377779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10682600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":13,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msec.2024.3449809","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}