{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:07:10Z","timestamp":1759133230095,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg (FNR) through PEARL","doi-asserted-by":"publisher","award":["FNR\/P14\/8149128"],"award-info":[{"award-number":["FNR\/P14\/8149128"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HP Research Chair in Cyber Security at Birmingham"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tifs.2017.2738609","type":"journal-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T18:41:57Z","timestamp":1502390517000},"page":"106-118","source":"Crossref","is-referenced-by-count":10,"title":["DECIM: Detecting Endpoint Compromise In Messaging"],"prefix":"10.1109","volume":"13","author":[{"given":"Jiangshan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Mark","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Cas","family":"Cremers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"journal-title":"Tamarin Models for the DECIM Protocol","year":"2016","author":"yu","key":"ref30"},{"journal-title":"Apple Just Fixed an Imessage Bug That Researchers Called Easily Exploitable","year":"2016","author":"chang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"year":"2016","key":"ref12"},{"journal-title":"Advanced cryptographic ratcheting","year":"2013","author":"marlinspike","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566892"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352619"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"journal-title":"Transparency Gossip HTTPS Transport","year":"2014","author":"nordberg","key":"ref28"},{"article-title":"Public perceptions of privacy and security in the post-snowden era","year":"2014","author":"madden","key":"ref4"},{"journal-title":"Transparency Gossip","year":"2014","author":"nordberg","key":"ref27"},{"journal-title":"GCHQ Intercepted Foreign Politicians","year":"2013","author":"macaskill","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"ref5","first-page":"14","article-title":"Why Johnny can&#x2019;t encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"1999","journal-title":"Proc USENIX Security07"},{"journal-title":"Common Vulnerabilities and Exposures","year":"2015","key":"ref8"},{"article-title":"CONIKS: A privacy-preserving consistent key service for secure end-to-end communication","year":"2014","author":"melara","key":"ref7"},{"journal-title":"Secret to Prism Program Even Bigger Data Seizure","year":"2013","author":"braun","key":"ref2"},{"journal-title":"Hack Brief Update iOS Now to Fix a Serious Imessage Crypto Flaw","year":"2016","author":"greenberg","key":"ref9"},{"journal-title":"U S British Intelligence Mining Data from Nine U S Internet Companies in Broad Secret Program","year":"2013","author":"gellman","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"journal-title":"Internet Mail Consortium","year":"2015","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5751"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4880"},{"journal-title":"The Official PGP User&#x2019;s Guide","year":"1995","author":"zimmermann","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw039"},{"key":"ref25","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Proc Crypto"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8114524\/08007243.pdf?arnumber=8007243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:24:20Z","timestamp":1642004660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8007243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2738609","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}