{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T17:14:11Z","timestamp":1649006051545},"reference-count":1,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.6.1526-1535","type":"journal-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T02:51:27Z","timestamp":1370400687000},"source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management"],"prefix":"10.17706","volume":"8","author":[{"given":"Zhaofeng","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,6,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/00397918108064294"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:25:20Z","timestamp":1442316320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,1]]},"references-count":1,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2013,6,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.6.1526-1535","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,6,1]]}}}