{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:15:33Z","timestamp":1726056933878},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335816"},{"type":"electronic","value":"9783030335823"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33582-3_75","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:46:34Z","timestamp":1572594394000},"page":"801-809","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Research for Instant Messaging Service in Taiwan \u2013 Build a Private Instant Messaging"],"prefix":"10.1007","author":[{"given":"Weng","family":"Chia-Cheng","sequence":"first","affiliation":[]},{"given":"Chen","family":"Ching-Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"75_CR1","unstructured":"iThome. \n https:\/\/www.ithome.com.tw\/news\/124203\n \n . Accessed 26 June 2018"},{"key":"75_CR2","unstructured":"Liberty Times Net. \n https:\/\/news.ltn.com.tw\/news\/world\/paper\/821286\n \n . 14 Oct 2014"},{"key":"75_CR3","unstructured":"iThome. \n https:\/\/www.ithome.com.tw\/news\/129579\n \n . Accessed 25 Mar 2019"},{"issue":"551","key":"75_CR4","first-page":"113","volume":"53","author":"F Tseng Po-Yuan","year":"2017","unstructured":"Tseng Po-Yuan, F., Hsieh Chih-Yuan, S.: Discussion on the influence of baoxin dream phenomenon on military security from the perspective of risk management. Army Bimonthly 53(551), 113\u2013128 (2017)","journal-title":"Army Bimonthly"},{"key":"75_CR5","unstructured":"National Security Council, F.: National Qualification Security Strategy Report - Information security is National security. 1st edn. National Security Council, Taiwan (2018)"},{"issue":"557","key":"75_CR6","first-page":"99","volume":"54","author":"F Chen Liang-Chu","year":"2016","unstructured":"Chen Liang-Chu, F., Fan Chung-Ping, S., Hsieh Chua-Jung, T.: The study on exploring the topics of cyber warfare security and management: using growing hierarchical self-organizing map. J. Inf. Manag. 54(557), 99\u2013128 (2016)","journal-title":"J. Inf. Manag."},{"issue":"551","key":"75_CR7","first-page":"92","volume":"53","author":"F Liu Ting-Chu","year":"2018","unstructured":"Liu Ting-Chu, F.: Discussion on constructing key factors of information security protection of national Army Cloud Data Center. Army Bimonthly 53(551), 92\u2013110 (2018)","journal-title":"Army Bimonthly"},{"issue":"4","key":"75_CR8","first-page":"475","volume":"22","author":"F Shaw Ruei-Siang","year":"2015","unstructured":"Shaw Ruei-Siang, F., Tsao chin-Feng, S., Chang Hui-Hsin, T.: A study of interface integrated campus cloud service management systems. J. Inf. Manag. 22(4), 475\u2013496 (2015)","journal-title":"J. Inf. Manag."},{"key":"75_CR9","unstructured":"National Information & Communication Security Taskforce. \n https:\/\/nicst.ey.gov.tw\/Page\/7CBD7E79D558D47C\/45d1f417-ca0c-4b30-aafa-ffeb9070a257\n \n . Accessed 22 May 2014"},{"key":"75_CR10","unstructured":"Wang Chien-Min, F., Wu Li-Chun, S, Li Hung-Wei, T.: LINE instant messaging software protocol and security analysis. In: (CISC 2014) Cryptology and Information Security Conference (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Emerging Trends in Intelligent Computing and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33582-3_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T08:22:22Z","timestamp":1572596542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33582-3_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030335816","9783030335823"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33582-3_75","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}