{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:06:46Z","timestamp":1760710006127},"reference-count":0,"publisher":"PTI","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2019f343","type":"proceedings-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T15:11:02Z","timestamp":1568992262000},"page":"41-46","source":"Crossref","is-referenced-by-count":1,"title":["Expanding graphs of the Extremal Graph Theory and expanded platforms of Post Quantum Cryptography"],"prefix":"10.15439","volume":"19","author":[{"given":"Vasyl","family":"Ustimenko","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Roma\u0144czuk-Polubiec","sequence":"additional","affiliation":[]},{"given":"Aneta","family":"Wr\u00f3blewska","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2019,9,26]]},"event":{"name":"2019 Federated Conference on Computer Science and Information Systems","start":{"date-parts":[[2019,9,1]]},"end":{"date-parts":[[2019,9,4]]},"acronym":"FedCSIS 2019"},"container-title":["Annals of Computer Science and Information Systems","Position Papers of the 2019 Federated Conference on Computer Science and Information Systems"],"original-title":[],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T07:06:11Z","timestamp":1725001571000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_19\/drp\/343.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2019f343","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2019,9,26]]}}}