{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T22:49:59Z","timestamp":1719614999429},"reference-count":0,"publisher":"Macrothink Institute, Inc.","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["NPA"],"DOI":"10.5296\/npa.v6i1.4862","type":"journal-article","created":{"date-parts":[[2014,5,10]],"date-time":"2014-05-10T07:05:41Z","timestamp":1399705541000},"page":"58","source":"Crossref","is-referenced-by-count":6,"title":["Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing"],"prefix":"10.5296","volume":"6","author":[{"given":"Rahul","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Annappa","family":"B","sequence":"additional","affiliation":[]}],"member":"3242","published-online":{"date-parts":[[2014,4,30]]},"container-title":["Network Protocols and Algorithms"],"original-title":[],"deposited":{"date-parts":[[2014,5,10]],"date-time":"2014-05-10T07:05:45Z","timestamp":1399705545000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.macrothink.org\/journal\/index.php\/npa\/article\/view\/4862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,30]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,4,30]]}},"URL":"https:\/\/doi.org\/10.5296\/npa.v6i1.4862","relation":{},"ISSN":["1943-3581"],"issn-type":[{"value":"1943-3581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,30]]}}}