{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:06Z","timestamp":1750307706017,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["XRDS"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1145\/1452012.1452017","type":"journal-article","created":{"date-parts":[[2009,1,8]],"date-time":"2009-01-08T13:15:38Z","timestamp":1231420538000},"page":"21-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data encryption"],"prefix":"10.1145","volume":"15","author":[{"given":"Ed","family":"DeHart","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2008,9]]},"reference":[{"unstructured":"Casad J. 2004. Sams Teach Yourself TCP\/IP 3rd Ed. Sams Publishing.   Casad J. 2004. Sams Teach Yourself TCP\/IP 3rd Ed. Sams Publishing.","key":"e_1_2_1_1_1"},{"unstructured":"Chapple M. 2003. Diffie-Hellman key exchange. http:\/\/ searchnetworking.techtarget.com\/tip\/1 289483 sid7_ gci879100 00. html.  Chapple M. 2003. Diffie-Hellman key exchange. http:\/\/ searchnetworking.techtarget.com\/tip\/1 289483 sid7_ gci879100 00. html.","key":"e_1_2_1_2_1"},{"unstructured":"Davis T. 2003. RSA encryption. http:\/\/www.geometer.org\/ mathcircles\/RSA.pdf.  Davis T. 2003. RSA encryption. http:\/\/www.geometer.org\/ mathcircles\/RSA.pdf.","key":"e_1_2_1_3_1"},{"unstructured":"Forouzan B. 2006. Data Communication and Networking 4th Ed. McGraw-Hill New York NY.   Forouzan B. 2006. Data Communication and Networking 4th Ed. McGraw-Hill New York NY.","key":"e_1_2_1_4_1"},{"unstructured":"Hesseldahl A. 2006. A quantum leap in data encryption. Business Week. http:\/\/www.businessweek.com\/technology\/content\/ nov2006\/tc20061106_302053.htm?campaign_id=biertcv.g3a. rssd1109z.  Hesseldahl A. 2006. A quantum leap in data encryption. Business Week . http:\/\/www.businessweek.com\/technology\/content\/ nov2006\/tc20061106_302053.htm?campaign_id=biertcv.g3a. rssd1109z.","key":"e_1_2_1_5_1"},{"volume-title":"SSL: Your key to e-commerce security","year":"2005","author":"Kerner S. M.","key":"e_1_2_1_6_1"},{"unstructured":"Tropical Software. DES encryption. http:\/\/www.tropsoft.com\/ strongenc\/des.htm.  Tropical Software. DES encryption. http:\/\/www.tropsoft.com\/ strongenc\/des.htm.","key":"e_1_2_1_7_1"},{"unstructured":"Vittorio S. Privacy through uncertainty. http:\/\/www.csa.com\/ discoveryguides\/crypt\/overview.php.  Vittorio S. Privacy through uncertainty. http:\/\/www.csa.com\/ discoveryguides\/crypt\/overview.php.","key":"e_1_2_1_8_1"},{"unstructured":"Weisstein E. W. Fermat's little theorem. http:\/\/mathworld.wolfram. com\/FermatsLittleTheorem.html.  Weisstein E. W. Fermat's little theorem. http:\/\/mathworld.wolfram. com\/FermatsLittleTheorem.html.","key":"e_1_2_1_9_1"},{"unstructured":"Wrixon F. B. 2005. Codes Ciphers Secrets and Cryptic Communication . Black Dog & Leventhal Publishers Inc.  Wrixon F. B. 2005. Codes Ciphers Secrets and Cryptic Communication . Black Dog & Leventhal Publishers Inc.","key":"e_1_2_1_10_1"}],"container-title":["XRDS: Crossroads, The ACM Magazine for Students"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1452012.1452017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1452012.1452017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:06Z","timestamp":1750253406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1452012.1452017"}},"subtitle":["mixing up the message in the name of security"],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["10.1145\/1452012.1452017"],"URL":"https:\/\/doi.org\/10.1145\/1452012.1452017","relation":{},"ISSN":["1528-4972","1528-4980"],"issn-type":[{"type":"print","value":"1528-4972"},{"type":"electronic","value":"1528-4980"}],"subject":[],"published":{"date-parts":[[2008,9]]},"assertion":[{"value":"2008-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}