{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:10:32Z","timestamp":1725617432935},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,3]]},"DOI":"10.1145\/1179576.1179595","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"91-94","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Discovering an RC4 anomaly through visualization"],"prefix":"10.1145","author":[{"given":"Dino","family":"Schweitzer","sequence":"first","affiliation":[{"name":"United States Air Force Academy CO"}]},{"given":"Leemon","family":"Baird","sequence":"additional","affiliation":[{"name":"United States Air Force Academy CO"}]}],"member":"320","published-online":{"date-parts":[[2006,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Master's Thesis","author":"Mantin","year":"2001","unstructured":"Mantin , Itsak , Analysis of the Stream Cipher RC4 , Master's Thesis , Weizmann Institute of Science , Rehovot, Israel , November 2001 . Mantin, Itsak, Analysis of the Stream Cipher RC4, Master's Thesis, Weizmann Institute of Science, Rehovot, Israel, November 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/43965.43966"},{"key":"e_1_3_2_1_3_1","volume-title":"Inc.","author":"Rivest","year":"1992","unstructured":"R.L. Rivest . The RC4 encryption algorithm. RSA Data Security , Inc. , Mar. 12, 1992 . R.L. Rivest. The RC4 encryption algorithm. RSA Data Security, Inc., Mar. 12, 1992."},{"volume-title":"Schneier B., \"Section 17.1 RC4,\" Applied Cryptography","year":"1996","key":"e_1_3_2_1_4_1","unstructured":"Schneier B., \"Section 17.1 RC4,\" Applied Cryptography , Second Edition, John Wiley & Sons , 1996 . Schneier B., \"Section 17.1 RC4,\" Applied Cryptography, Second Edition, John Wiley & Sons, 1996."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 10th Colloquium for Information Systems Security Education","author":"Schweitzer D.","year":"2006","unstructured":"Schweitzer D. , Baird L. , Collins M. , Brown W. , Sherman M., GRASP : A visualization tool for teaching security protocols , Proceedings of the 10th Colloquium for Information Systems Security Education , June 2006 . Schweitzer D., Baird L., Collins M., Brown W., Sherman M., GRASP: A visualization tool for teaching security protocols, Proceedings of the 10th Colloquium for Information Systems Security Education, June 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652079"},{"key":"e_1_3_2_1_7_1","volume-title":"The visual display of quantitative information","author":"Tufte E.","year":"1986","unstructured":"Tufte E. , The visual display of quantitative information , Graphics Press , Cheshire, CT , 1986 . Tufte E., The visual display of quantitative information, Graphics Press, Cheshire, CT, 1986."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/237466.237534"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the 3rd international workshop on Visualization for computer security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179576.1179595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T21:18:03Z","timestamp":1673385483000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179576.1179595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,3]]},"references-count":8,"alternative-id":["10.1145\/1179576.1179595","10.1145\/1179576"],"URL":"https:\/\/doi.org\/10.1145\/1179576.1179595","relation":{},"subject":[],"published":{"date-parts":[[2006,11,3]]},"assertion":[{"value":"2006-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}