{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:40:25Z","timestamp":1773736825952,"version":"3.50.1"},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1515\/gcc-2012-0009","type":"journal-article","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T12:13:01Z","timestamp":1366027981000},"source":"Crossref","is-referenced-by-count":2,"title":["No-leak authentication by the Sherlock Holmes method"],"prefix":"10.1515","volume":"4","author":[{"given":"Dima","family":"Grigoriev","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"374","container-title":["Groups - Complexity - Cryptology"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/view\/j\/gcc.2012.4.issue-1\/gcc-2012-0009\/gcc-2012-0009.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T03:07:58Z","timestamp":1614395278000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/gcc-2012-0009\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":0,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1515\/gcc-2012-0009","relation":{},"ISSN":["1867-1144","1869-6104"],"issn-type":[{"value":"1867-1144","type":"print"},{"value":"1869-6104","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}