{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:47:35Z","timestamp":1753886855635,"version":"3.41.2"},"reference-count":0,"publisher":"Inderscience Publishers","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJSN"],"published-print":{"date-parts":[[2008]]},"DOI":"10.1504\/ijsn.2008.017223","type":"journal-article","created":{"date-parts":[[2008,2,20]],"date-time":"2008-02-20T07:30:35Z","timestamp":1203492635000},"page":"103","source":"Crossref","is-referenced-by-count":13,"title":["On the (un)reliability of eavesdropping"],"prefix":"10.1504","volume":"3","author":[{"given":"Eric","family":"Cronin","sequence":"first","affiliation":[]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Blaze","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Security and Networks"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T09:07:26Z","timestamp":1310548046000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.inderscience.com\/link.php?id=17223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008]]}},"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1504\/ijsn.2008.017223","relation":{},"ISSN":["1747-8405","1747-8413"],"issn-type":[{"type":"print","value":"1747-8405"},{"type":"electronic","value":"1747-8413"}],"subject":[],"published":{"date-parts":[[2008]]},"article-number":"17223"}}