{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:29Z","timestamp":1750307669813,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,4]],"date-time":"2009-04-04T00:00:00Z","timestamp":1238803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,4]]},"DOI":"10.1145\/1520340.1520624","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"4099-4104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Waterhouse"],"prefix":"10.1145","author":[{"given":"Alex P.","family":"Lambert","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Stephen M.","family":"Bezek","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Karrie G.","family":"Karahalios","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1408358"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2311"},{"key":"e_1_3_2_1_4_1","unstructured":"Enigmail Project. Enigmail 0.95.6 screenshots. http:\/\/enigmail.mozdev.org\/documentation\/ screenshots.php  Enigmail Project. Enigmail 0.95.6 screenshots. http:\/\/enigmail.mozdev.org\/documentation\/ screenshots.php"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. Third Annual PKI R&D Workshop, NTIS","author":"Gutmann P.","year":"2004","unstructured":"Gutmann , P. How to build a PKI that works . In Proc. Third Annual PKI R&D Workshop, NTIS ( 2004 ). Gutmann, P. How to build a PKI that works. In Proc. Third Annual PKI R&D Workshop, NTIS (2004)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2821"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280696"},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy enhancement for Internet electronic mail (RFC 989). IAB Privacy Task Force","author":"Linn J.","year":"1987","unstructured":"Linn , J. Privacy enhancement for Internet electronic mail (RFC 989). IAB Privacy Task Force ( 1987 ). Linn, J. Privacy enhancement for Internet electronic mail (RFC 989). IAB Privacy Task Force (1987)."},{"key":"e_1_3_2_1_9_1","unstructured":"R\u00e9seaux IP Europ\u00e9ens Network Coordination Centre. E-mail client testing for S\/MIME compliance. http:\/\/www.ripe.net\/db\/support\/security\/ mail_client_tests.html  R\u00e9seaux IP Europ\u00e9ens Network Coordination Centre. E-mail client testing for S\/MIME compliance. http:\/\/www.ripe.net\/db\/support\/security\/ mail_client_tests.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_11_1","unstructured":"U.S. Court of Appeals for the First Circuit. United States of America v. Bradford C. Councilman 418 F.3d 67.  U.S. Court of Appeals for the First Circuit. United States of America v. Bradford C. Councilman 418 F.3d 67."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251435"},{"key":"e_1_3_2_1_13_1","unstructured":"Yahoo. Yahoo! Mail Web Services. http:\/\/developer.yahoo.com\/mail\/  Yahoo. Yahoo! Mail Web Services. http:\/\/developer.yahoo.com\/mail\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/202735"}],"event":{"name":"CHI '09: CHI Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Boston MA USA","acronym":"CHI '09"},"container-title":["CHI '09 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1520340.1520624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1520340.1520624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:36Z","timestamp":1750253376000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1520340.1520624"}},"subtitle":["enabling secure e-mail with social networking"],"short-title":[],"issued":{"date-parts":[[2009,4,4]]},"references-count":14,"alternative-id":["10.1145\/1520340.1520624","10.1145\/1520340"],"URL":"https:\/\/doi.org\/10.1145\/1520340.1520624","relation":{},"subject":[],"published":{"date-parts":[[2009,4,4]]},"assertion":[{"value":"2009-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}