{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:59:29Z","timestamp":1730289569422,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/pimrc.2018.8580880","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T19:01:28Z","timestamp":1547060488000},"page":"32-36","source":"Crossref","is-referenced-by-count":1,"title":["Are E-mails Files Reliable Evidences?"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Amoroso","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Crypto","year":"0","key":"ref10"},{"journal-title":"Mailvelope openpgp encryption for webmail","year":"0","key":"ref11"},{"journal-title":"The simple way to send a secure email","year":"0","key":"ref12"},{"key":"ref13","article-title":"Decreto del presidente della repubblica 11 febbraio 2005, n.68 regolamento recante disposizioni per l'utilizzo della posta elettronica certificata, a norma dell'articolo 27 della legge 16 gennaio 2003, n. 3","volume":"97","year":"2005","journal-title":"Gazzetta Ufficiale 28 marzo"},{"key":"ref14","article-title":"Legge 16 gennaio 2003, n. 3. disposizioni ordinamentali in materia di pubblica amministrazione","volume":"5","year":"2003","journal-title":"Gazzetta Ufficiale n 15 del 20 Gennaio 2003 - Supplemento Ordinarion"},{"journal-title":"Gazzetta Ufficiale Serie Generale n 294 del 18-12-2012","article-title":"Decreto del presidente del consiglio dei ministri 27 settembre 2012 regole tecniche per l'identificazione, anche in via telematica, del titolare della casella di posta elettronica certificata, ai sensi dell'articolo 65, comma 1, lettera c-bis), del codice dell'amministrazione digitale, di cui al decreto legislativo 7 marzo 2005 n. 82 e successive modificazioni","year":"2012","key":"ref15"},{"journal-title":"How to edit received emails in macos mail clean up emails people send you by editing them yourself","year":"0","author":"tschabitscher","key":"ref16"},{"journal-title":"Mozilla thunderbird portable edition email client","year":"0","key":"ref17"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2010","author":"casey","key":"ref18"},{"journal-title":"Sender Policy Framework (SPF) for Authorising Use of Domains in Email Version 1","year":"0","key":"ref19"},{"journal-title":"Security techniques &#x2014; Guidelines for the analysis and interpretation of digital evidence First edition ser 27042 2015(E)","year":"2015","key":"ref4"},{"journal-title":"Security techniques &#x2014; Guidance on assuring suitability and adequacy of incident investigative method First edition ser 27041 2015(E)","year":"2015","key":"ref3"},{"journal-title":"Guide to Computer Forensics and Investigations","year":"2019","author":"nelson","key":"ref6"},{"journal-title":"Security techniques &#x2014; Incident investigation principles and processes First edition ser 27043 2015(E)","year":"2015","key":"ref5"},{"journal-title":"Openpgp - email encryption for all operating systems standing the test of time","year":"0","key":"ref8"},{"journal-title":"Digital Evidence and Computer Crime Forensic science computers and the internet Third edition","year":"2011","author":"casey","key":"ref7"},{"journal-title":"Security techniques &#x2014; Guidelines for identification collection acquisition and preservation of digital evidence First edition ser 27037 2012(E)","year":"2012","key":"ref2"},{"journal-title":"Security techniques &#x2013; Information security incident management ser 27035 2011(E)","year":"2011","key":"ref1"},{"journal-title":"Secure email based in switzerland","year":"0","key":"ref9"},{"journal-title":"pyspf 2 0 12 - spf (sender policy framework) implemented in python","year":"0","author":"gathman","key":"ref20"},{"journal-title":"dkimpy - python module that implements dkim (domainkeys identified mail) email signing and verification","year":"0","author":"kitterman","key":"ref22"},{"journal-title":"Domainkeys Identified Mail (DKIM) Signatures","year":"0","key":"ref21"},{"journal-title":"Practical Unix & Internet Security","year":"2003","author":"garfinkel","key":"ref24"},{"journal-title":"Authenticated received chain (arc) protocol - draft-ietf-dmarc-arc-protocol-14","year":"0","key":"ref23"}],"event":{"name":"2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2018,9,9]]},"location":"Bologna","end":{"date-parts":[[2018,9,12]]}},"container-title":["2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8552603\/8580668\/08580880.pdf?arnumber=8580880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:09:01Z","timestamp":1598242141000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8580880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2018.8580880","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}