{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:56:32Z","timestamp":1764842192998,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T00:00:00Z","timestamp":1553472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1717801"],"award-info":[{"award-number":["CNS-1717801"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,25]]},"DOI":"10.1145\/3302424.3303980","type":"proceedings-article","created":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T13:10:03Z","timestamp":1553260203000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Why Joanie Can Encrypt"],"prefix":"10.1145","author":[{"given":"John S.","family":"Koh","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Steven M.","family":"Bellovin","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2019,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SSARES: Secure Searchable Automated Remote Email Storage. In 23rd Annual Computer Security Applications Conference","author":"Aviv Adam J.","year":"2007","unstructured":"Adam J. Aviv , Michael E. Locasto , Shaya Potter , and Angelos D. Keromytis . 2007 . SSARES: Secure Searchable Automated Remote Email Storage. In 23rd Annual Computer Security Applications Conference , 2007 (ACSAC '07). IEEE, ACSA, Miami Beach, Florida, USA, 129--139. Adam J. Aviv, Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis. 2007. SSARES: Secure Searchable Automated Remote Email Storage. In 23rd Annual Computer Security Applications Conference, 2007 (ACSAC '07). IEEE, ACSA, Miami Beach, Florida, USA, 129--139."},{"key":"e_1_3_2_1_2_1","unstructured":"Stuart Brandt. 2019. IMAP REPLACE Extension. RFC 7162. IETF. 11 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc8508.txt  Stuart Brandt. 2019. IMAP REPLACE Extension. RFC 7162. IETF. 11 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc8508.txt"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jon Callas Lutz Donnerhacke Hal Finney David Shaw and Rodney Thayer. 2007. OpenPGP Message Format. RFC 4880. IETF. 89 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt  Jon Callas Lutz Donnerhacke Hal Finney David Shaw and Rodney Thayer. 2007. OpenPGP Message Format. RFC 4880. IETF. 89 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt","DOI":"10.17487\/rfc4880"},{"key":"e_1_3_2_1_4_1","unstructured":"Mike Cardwell. 2011. Automatically Encrypting all Incoming Email. https:\/\/www.grepular.com\/Automatically_Encrypting_all_Incoming_Emails. (2011).  Mike Cardwell. 2011. Automatically Encrypting all Incoming Email. https:\/\/www.grepular.com\/Automatically_Encrypting_all_Incoming_Emails. (2011)."},{"key":"e_1_3_2_1_5_1","volume-title":"15 USC CHAPTER 2","author":"US Federal Trade Commission","year":"1914","unstructured":"US Federal Trade Commission . 1914. 15 USC CHAPTER 2 , SUBCHAPTER I : FEDERAL TRADE COMMISSION. http:\/\/uscode.house.gov\/view.xhtml?req=granuleid%3AUSC-prelim-title15-chapter2-subchapter1&edition=prelim. ( Sept. 1914 ). US Federal Trade Commission. 1914. 15 USC CHAPTER 2, SUBCHAPTER I: FEDERAL TRADE COMMISSION. http:\/\/uscode.house.gov\/view.xhtml?req=granuleid%3AUSC-prelim-title15-chapter2-subchapter1&edition=prelim. (Sept. 1914)."},{"key":"e_1_3_2_1_6_1","volume-title":"Federal Trade Commission Act - Section 5: Unfair or Deceptive Acts or Practices. https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/ftca.pdf. (Dec","author":"US Federal Trade Commission","year":"2016","unstructured":"US Federal Trade Commission . 2016. Federal Trade Commission Act - Section 5: Unfair or Deceptive Acts or Practices. https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/ftca.pdf. (Dec . 2016 ). US Federal Trade Commission. 2016. Federal Trade Commission Act - Section 5: Unfair or Deceptive Acts or Practices. https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/ftca.pdf. (Dec. 2016)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"David Cooper Stefan Santesson Stephen Farrell Sharon Boeyen Russell Housley and William Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF. 151 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt  David Cooper Stefan Santesson Stephen Farrell Sharon Boeyen Russell Housley and William Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF. 151 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3501"},{"key":"e_1_3_2_1_9_1","unstructured":"Apple Developer. 2018. SecACLCreateWithSimpleContents - Security | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/security\/1402295-secaclcreatewithsimplecontents?language=objc. (2018).  Apple Developer. 2018. SecACLCreateWithSimpleContents - Security | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/security\/1402295-secaclcreatewithsimplecontents?language=objc. (2018)."},{"key":"e_1_3_2_1_10_1","unstructured":"Google Developers. 2018. KeyChain | Android Developers. https:\/\/developer.android.com\/reference\/android\/security\/KeyChain. (2018).  Google Developers. 2018. KeyChain | Android Developers. https:\/\/developer.android.com\/reference\/android\/security\/KeyChain. (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500428"},{"key":"e_1_3_2_1_12_1","volume-title":"Teen Hackers: A '5-Year-Old' Could Have Hacked into CIA Director's Emails. VICE Motherboard. (Oct.","author":"Franceschi-Bicchierai Lorenzo","year":"2015","unstructured":"Lorenzo Franceschi-Bicchierai . 2015 . Teen Hackers: A '5-Year-Old' Could Have Hacked into CIA Director's Emails. VICE Motherboard. (Oct. 2015). https:\/\/motherboard.vice.com\/read\/teen-hackers-a-5-year-old-could-have-hacked-into-cia-directors-emails Lorenzo Franceschi-Bicchierai. 2015. Teen Hackers: A '5-Year-Old' Could Have Hacked into CIA Director's Emails. VICE Motherboard. (Oct. 2015). https:\/\/motherboard.vice.com\/read\/teen-hackers-a-5-year-old-could-have-hacked-into-cia-directors-emails"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1123196.1123245"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176992"},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2018. roughtime - Git at Google. https:\/\/roughtime.googlesource.com\/roughtime. (2018).  Google. 2018. roughtime - Git at Google. https:\/\/roughtime.googlesource.com\/roughtime. (2018)."},{"volume-title":"Google One - More storage and extra benefits from Google. https:\/\/one.google.com\/about. (Feb","year":"2019","key":"e_1_3_2_1_16_1","unstructured":"Google. 2019. Google One - More storage and extra benefits from Google. https:\/\/one.google.com\/about. (Feb . 2019 ). Google. 2019. Google One - More storage and extra benefits from Google. https:\/\/one.google.com\/about. (Feb. 2019)."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2019. How Google retains data we collect -- Privacy & Terms -- Google. https:\/\/policies.google.com\/technologies\/retention?hl=en. (2019).  Google. 2019. How Google retains data we collect -- Privacy & Terms -- Google. https:\/\/policies.google.com\/technologies\/retention?hl=en. (2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3760"},{"key":"e_1_3_2_1_19_1","volume-title":"How to automatically PGP\/MIME encrypt incoming mail via procmail. https:\/\/www.j3e.de\/pgp-mime-encrypt-in-procmail.html. (Oct","author":"Jacke Bj\u00f6rn","year":"2008","unstructured":"Bj\u00f6rn Jacke . 2008. How to automatically PGP\/MIME encrypt incoming mail via procmail. https:\/\/www.j3e.de\/pgp-mime-encrypt-in-procmail.html. (Oct . 2008 ). Bj\u00f6rn Jacke. 2008. How to automatically PGP\/MIME encrypt incoming mail via procmail. https:\/\/www.j3e.de\/pgp-mime-encrypt-in-procmail.html. (Oct. 2008)."},{"key":"e_1_3_2_1_20_1","volume-title":"Russian hackers hunt hi-tech secrets, exploiting US weakness","author":"Jeff Donn Raphael Satter","year":"2018","unstructured":"Raphael Satter Jeff Donn , Desmond Butler . 2018. Russian hackers hunt hi-tech secrets, exploiting US weakness . Associated Press . (7 Feb. 2018 ). https:\/\/apnews.com\/cc616fa229da4d59b230d88cd52dda51 Raphael Satter Jeff Donn, Desmond Butler. 2018. Russian hackers hunt hi-tech secrets, exploiting US weakness. Associated Press. (7 Feb. 2018). https:\/\/apnews.com\/cc616fa229da4d59b230d88cd52dda51"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSLP.1996.607046"},{"key":"e_1_3_2_1_22_1","unstructured":"Werner Koch and Marcus Brinkmann. 2011. STEED--Usable End-to-End Encryption. White Paper. https:\/\/g10code.com\/docs\/steed-usable-e2ee.pdf  Werner Koch and Marcus Brinkmann. 2011. STEED--Usable End-to-End Encryption. White Paper. https:\/\/g10code.com\/docs\/steed-usable-e2ee.pdf"},{"key":"e_1_3_2_1_23_1","volume-title":"Is this the email that hacked John Podesta's account? CNN Politics. (30","author":"Krieg Gregory","year":"2016","unstructured":"Gregory Krieg and Tal Kopan . 2016. Is this the email that hacked John Podesta's account? CNN Politics. (30 Oct. 2016 ). http:\/\/www.cnn.com\/2016\/10\/28\/politics\/phishing-email-hack-john-podesta-hillary-clinton-wikileaks\/ Gregory Krieg and Tal Kopan. 2016. Is this the email that hacked John Podesta's account? CNN Politics. (30 Oct. 2016). http:\/\/www.cnn.com\/2016\/10\/28\/politics\/phishing-email-hack-john-podesta-hillary-clinton-wikileaks\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE","author":"Lerner Ada","year":"2017","unstructured":"Ada Lerner , Eric Zeng , and Franziska Roesner . 2017 . Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE , Paris, France, 385--400. Ada Lerner, Eric Zeng, and Franziska Roesner. 2017. Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, Paris, France, 385--400."},{"key":"e_1_3_2_1_25_1","unstructured":"Lavabit LLC. 2004. Lavabit. https:\/\/lavabit.com\/. (2004).  Lavabit LLC. 2004. Lavabit. https:\/\/lavabit.com\/. (2004)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Alexey Melnikov and Dave Cridland. 2014. IMAP Extensions: Quick Flag Changes Resynchronization (CONDSTORE) and Quick Mailbox Resynchronization (QRESYNC). RFC 7162. IETF. 52 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc7162.txt  Alexey Melnikov and Dave Cridland. 2014. IMAP Extensions: Quick Flag Changes Resynchronization (CONDSTORE) and Quick Mailbox Resynchronization (QRESYNC). RFC 7162. IETF. 52 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc7162.txt","DOI":"10.17487\/rfc7162"},{"key":"e_1_3_2_1_27_1","unstructured":"U.S. Department of Health & Human Services. 2015. System Usability Scale (SUS). (2015). http:\/\/www.usability.gov\/how-to-and-tools\/methods\/system-usability-scale.html  U.S. Department of Health & Human Services. 2015. System Usability Scale (SUS). (2015). http:\/\/www.usability.gov\/how-to-and-tools\/methods\/system-usability-scale.html"},{"key":"e_1_3_2_1_28_1","unstructured":"Posteo. 2009. Email green secure simple and ad-free - posteo.de - Features. (2009). https:\/\/posteo.de\/en\/site\/features#featuresprivacy  Posteo. 2009. Email green secure simple and ad-free - posteo.de - Features. (2009). https:\/\/posteo.de\/en\/site\/features#featuresprivacy"},{"key":"e_1_3_2_1_29_1","unstructured":"Posteo. 2015. Help - How do I activate inbound encryption with my public PGP key? - posteo.de. (2015). https:\/\/posteo.de\/en\/help\/how-do-i-activate-inbound-encryption-with-my-public-pgp-key  Posteo. 2015. Help - How do I activate inbound encryption with my public PGP key? - posteo.de. (2015). https:\/\/posteo.de\/en\/help\/how-do-i-activate-inbound-encryption-with-my-public-pgp-key"},{"key":"e_1_3_2_1_30_1","volume-title":"If You Used This Secure Webmail Site, the FBI Has Your Inbox. WIRED. (Jan","author":"Poulsen Kevin","year":"2014","unstructured":"Kevin Poulsen . 2014. If You Used This Secure Webmail Site, the FBI Has Your Inbox. WIRED. (Jan . 2014 ). http:\/\/www.wired.com\/2014\/01\/tormail\/ Kevin Poulsen. 2014. If You Used This Secure Webmail Site, the FBI Has Your Inbox. WIRED. (Jan. 2014). http:\/\/www.wired.com\/2014\/01\/tormail\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Blake Ramsdell and Sean Turner. 2010. Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.2 Message Specification. RFC 5751. IETF. 45 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc5751.txt  Blake Ramsdell and Sean Turner. 2010. Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.2 Message Specification. RFC 5751. IETF. 45 pages. http:\/\/www.rfc-editor.org\/rfc\/rfc5751.txt","DOI":"10.17487\/rfc5751"},{"key":"e_1_3_2_1_32_1","unstructured":"rtyley. 2018. Spongycastle by rtyley. Github.io. (2018). https:\/\/rtyley.github.io\/spongycastle\/  rtyley. 2018. Spongycastle by rtyley. Github.io. (2018). https:\/\/rtyley.github.io\/spongycastle\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858400"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984580"},{"key":"e_1_3_2_1_35_1","volume-title":"Seamons","author":"Ruoti Scott","year":"2015","unstructured":"Scott Ruoti , Jeff Andersen , Daniel Zappala , and Kent E . Seamons . 2015 . Why Johnny Still, Still Can't Encrypt : Evaluating the Usability of a Modern PGP Client. CoRR abs\/1510.08555 (Oct. 2015), 5. arXiv:1510.08555 http:\/\/arxiv.org\/abs\/1510.08555 Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent E. Seamons. 2015. Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs\/1510.08555 (Oct. 2015), 5. arXiv:1510.08555 http:\/\/arxiv.org\/abs\/1510.08555"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501609"},{"key":"e_1_3_2_1_37_1","volume-title":"Email Client Market Share Trends for the First Half of 2018 -- Litmus Software","author":"Specht Bettina","year":"2018","unstructured":"Bettina Specht . 2018. Email Client Market Share Trends for the First Half of 2018 -- Litmus Software , Inc . https:\/\/litmus.com\/blog\/email-client-market-share-trends-first-half-of- 2018 . (13 July 2018). Bettina Specht. 2018. Email Client Market Share Trends for the First Half of 2018 -- Litmus Software, Inc. https:\/\/litmus.com\/blog\/email-client-market-share-trends-first-half-of-2018. (13 July 2018)."},{"key":"e_1_3_2_1_38_1","unstructured":"Autocrypt Team. 2016. Autocrypt 1.0.1 documentation. https:\/\/autocrypt.org\/. (2016).  Autocrypt Team. 2016. Autocrypt 1.0.1 documentation. https:\/\/autocrypt.org\/. (2016)."},{"key":"e_1_3_2_1_39_1","volume-title":"Hacker wanted to 'derail' Palin. The Washington Times. (19","author":"The Washington","year":"2008","unstructured":"The Washington Times 2008. Hacker wanted to 'derail' Palin. The Washington Times. (19 Sept. 2008 ). http:\/\/www.washingtontimes.com\/news\/2008\/sep\/19\/hacker-wanted-to-derail-palin\/ The Washington Times 2008. Hacker wanted to 'derail' Palin. The Washington Times. (19 Sept. 2008). http:\/\/www.washingtontimes.com\/news\/2008\/sep\/19\/hacker-wanted-to-derail-palin\/"},{"key":"e_1_3_2_1_40_1","unstructured":"Tutanota. 2011. Secure email: Tutanota makes encrypted emails easy. (2011). https:\/\/tutanota.com\/  Tutanota. 2011. Secure email: Tutanota makes encrypted emails easy. (2011). https:\/\/tutanota.com\/"},{"key":"e_1_3_2_1_41_1","volume-title":"Servers of email host used in US school bomb threats seized by German police. (Dec","author":"Whittaker Zack","year":"2015","unstructured":"Zack Whittaker . 2015. Servers of email host used in US school bomb threats seized by German police. (Dec . 2015 ). http:\/\/www.zdnet.com\/article\/email-providers-servers-seized-by-german-police-admin-forced-to-turn-over-encryption-keys\/ Zack Whittaker. 2015. Servers of email host used in US school bomb threats seized by German police. (Dec. 2015). http:\/\/www.zdnet.com\/article\/email-providers-servers-seized-by-german-police-admin-forced-to-turn-over-encryption-keys\/"},{"volume-title":"Proceedings of the 8th USENIX Security Symposium. USENIX Association, Washington, D.C., USA, 169--184","author":"Whitten Alma","key":"e_1_3_2_1_42_1","unstructured":"Alma Whitten and J. D. Tygar . 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 .. In Proceedings of the 8th USENIX Security Symposium. USENIX Association, Washington, D.C., USA, 169--184 . Alma Whitten and J. D. Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.. In Proceedings of the 8th USENIX Security Symposium. USENIX Association, Washington, D.C., USA, 169--184."},{"key":"e_1_3_2_1_43_1","unstructured":"WikiLeaks. 2018. WikiLeaks --- Sony Archives. WikiLeaks. (2018). https:\/\/wikileaks.org\/sony\/emails\/  WikiLeaks. 2018. WikiLeaks --- Sony Archives. WikiLeaks. (2018). https:\/\/wikileaks.org\/sony\/emails\/"},{"key":"e_1_3_2_1_44_1","volume-title":"Revealing Putin Aide's Secrets. NBC News. (27","author":"Windrem Robert","year":"2016","unstructured":"Robert Windrem . 2016. Payback? Russia Gets Hacked , Revealing Putin Aide's Secrets. NBC News. (27 Oct. 2016 ). http:\/\/www.nbcnews.com\/storyline\/ukraine-crisis\/payback-russia-gets-hacked-revealing-putin-aides-secrets-n673956 Robert Windrem. 2016. Payback? Russia Gets Hacked, Revealing Putin Aide's Secrets. NBC News. (27 Oct. 2016). http:\/\/www.nbcnews.com\/storyline\/ukraine-crisis\/payback-russia-gets-hacked-revealing-putin-aides-secrets-n673956"}],"event":{"name":"EuroSys '19: Fourteenth EuroSys Conference 2019","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Dresden Germany","acronym":"EuroSys '19"},"container-title":["Proceedings of the Fourteenth EuroSys Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302424.3303980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302424.3303980","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302424.3303980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:49Z","timestamp":1750208509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302424.3303980"}},"subtitle":["Easy Email Encryption with Easy Key Management"],"short-title":[],"issued":{"date-parts":[[2019,3,25]]},"references-count":44,"alternative-id":["10.1145\/3302424.3303980","10.1145\/3302424"],"URL":"https:\/\/doi.org\/10.1145\/3302424.3303980","relation":{},"subject":[],"published":{"date-parts":[[2019,3,25]]},"assertion":[{"value":"2019-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}