{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T07:17:46Z","timestamp":1694675866441},"reference-count":0,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T00:00:00Z","timestamp":1401408000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1002\/sec.1050","type":"journal-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T07:40:44Z","timestamp":1401435644000},"page":"1311-1312","source":"Crossref","is-referenced-by-count":1,"title":["Advances in trusted network computing"],"prefix":"10.1002","volume":"7","author":[{"given":"Yulei","family":"Wu","sequence":"first","affiliation":[{"name":"Computer Network Information Center Chinese Academy of Sciences  Beijing 100190 China"}]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering Central South University  Hunan 410083 China"}]},{"given":"Ahmed","family":"Al\u2010Dubai","sequence":"additional","affiliation":[{"name":"School of Computing Edinburgh Napier University  Edinburgh EH10 5DT U.K."}]}],"member":"311","published-online":{"date-parts":[[2014,5,30]]},"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1050","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T15:39:12Z","timestamp":1694619552000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,30]]},"references-count":0,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["10.1002\/sec.1050"],"URL":"https:\/\/doi.org\/10.1002\/sec.1050","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,30]]}}}