{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T06:08:33Z","timestamp":1748585313012,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,23]]},"DOI":"10.23919\/cisti52073.2021.9476399","type":"proceedings-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T21:44:30Z","timestamp":1626126270000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["An end-to-end cryptography based real-time chat"],"prefix":"10.23919","author":[{"given":"Tiezer","family":"Melo","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Frazao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"631","article-title":"Cryptographic extraction and key derivation: The HKDF scheme","author":"krawczyk","year":"2010","journal-title":"Annual Cryptology Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09360-1"},{"key":"ref10","article-title":"Extending the Salsa20 nonce","volume":"2011","author":"bernstein","year":"2011","journal-title":"Workshop record of Symmetric Key Encryption Workshop"},{"key":"ref6","article-title":"The double ratchet algorithm","author":"perrin","year":"2016","journal-title":"GitHub Wiki"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70084-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1459"},{"journal-title":"Secure Schemes for Secret Sharing and Key Distribution PhD thesis","year":"1996","author":"beimel","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1978.1089775"},{"key":"ref1","first-page":"13","author":"stallings","year":"2014","journal-title":"Computer Security Principles and Practice"}],"event":{"name":"2021 16th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2021,6,23]]},"location":"Chaves, Portugal","end":{"date-parts":[[2021,6,26]]}},"container-title":["2021 16th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9476245\/9476219\/09476399.pdf?arnumber=9476399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:37:33Z","timestamp":1643179053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9476399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,23]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/cisti52073.2021.9476399","relation":{},"subject":[],"published":{"date-parts":[[2021,6,23]]}}}