{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:21:19Z","timestamp":1767165679093,"version":"build-2238731810"},"update-to":[{"DOI":"10.1155\/2018\/2483619","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000}}],"reference-count":1,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["hindawi.com"],"crossmark-restriction":true},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1155\/2019\/5742308","type":"journal-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:35:32Z","timestamp":1556825732000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1155\/corrections_policy","source":"Crossref","is-referenced-by-count":0,"title":["Erratum to \u201cA Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism\u201d"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2421-2940","authenticated-orcid":true,"given":"Ye","family":"Yuan","sequence":"first","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 10084, China"},{"name":"Institute of Microelectronics, Tsinghua University, Beijing 10084, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1318-6329","authenticated-orcid":true,"given":"Liji","family":"Wu","sequence":"additional","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 10084, China"},{"name":"Institute of Microelectronics, Tsinghua University, Beijing 10084, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4496-3154","authenticated-orcid":true,"given":"Yijun","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 10084, China"},{"name":"Institute of Microelectronics, Tsinghua University, Beijing 10084, China"}]},{"given":"Xiangmin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 10084, China"},{"name":"Institute of Microelectronics, Tsinghua University, Beijing 10084, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2483619"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5742308.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5742308.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5742308.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T10:10:12Z","timestamp":1704363012000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/5742308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":1,"alternative-id":["5742308","5742308"],"URL":"https:\/\/doi.org\/10.1155\/2019\/5742308","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,2]]}}}