{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T07:29:50Z","timestamp":1649143790999},"reference-count":56,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2015,10,2]]},"DOI":"10.1080\/01611194.2014.988369","type":"journal-article","created":{"date-parts":[[2015,6,17]],"date-time":"2015-06-17T21:02:51Z","timestamp":1434574971000},"page":"342-361","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Encrypted Books: Mysteries that Fill Hundreds of Pages"],"prefix":"10.1080","volume":"39","author":[{"given":"Klaus","family":"Schmeh","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,6,17]]},"reference":[{"key":"CIT0001","unstructured":"Adelsbach, M. 2012. \u201cZauberbuch\u201d: Wer kann es entziffern? http:\/\/web.archive.org\/web\/20121102123749\/http:\/\/einestages.spiegel.de\/static\/image_without_story\/24402\/_zauberbuch_wer_kann_es_entziffern.html."},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/0161-117891853261"},{"key":"CIT0003","unstructured":"Anonymous. 2013. Written Mnemonics\u2014Deciphering a Controversial Ritual. http:\/\/nationalheritagemuseum.typepad.com\/library_and_archives\/ciphers\/."},{"key":"CIT0004","unstructured":"Anonymous. 2014. Lord Hailsham's Coded Diary. http:\/\/www.margaretthatcher.org\/archive\/hailsham.asp."},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118691861010"},{"key":"CIT0006","unstructured":"Benhamou, A. 2012. Why was Montholon Nicknamed the \u201cLiar\u201d? http:\/\/www.inside-longwood.com\/inside-longwood-articles-montholon.html."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118391857955"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/01611190802232155"},{"key":"CIT0009","doi-asserted-by":"crossref","DOI":"10.3138\/9781442681330","volume-title":"The Gallery of Memory","author":"Bolzoni L.","year":"2001"},{"key":"CIT0010","volume-title":"The Master-Key Through All the Degrees of a Free-Mason's Lodge; To Which Are Added, Eulogiums and Illustrations\u00a0\u2026\u00a0","author":"Browne J.","year":"2010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/01611190701244541"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119191865876"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1080\/0161-117791832751"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1080\/0161-117891853108"},{"key":"CIT0015","volume-title":"Elias Ashmole 1617\u20131692","author":"Josten K.","year":"1996"},{"key":"CIT0016","volume-title":"The Codebreakers","author":"Kahn D.","year":"1996"},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Knight, K., B. Megyesi, and C. Schaefer. 2012. The Copiale Cipher. http:\/\/stp.lingfil.uu.se\/~bea\/copiale\/.","DOI":"10.1558\/jrff.v2i2.314"},{"key":"CIT0018","unstructured":"Kn\u00f6rzer, O. 2013. Book of Woo. http:\/\/www.sandraandwoo.com\/2013\/07\/29\/0500-the-book-of-woo\/."},{"key":"CIT0019","volume-title":"Johannes Fontana: Liber Instrumentorum Iconographicus","author":"Kranz H.","year":"2014"},{"key":"CIT0020","volume-title":"Mechanisches Memorieren und Chiffrieren um 1430","author":"Kranz H.","year":"2009"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110191889932"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/01611191003605587"},{"key":"CIT0023","author":"Langie A.","year":"1922","journal-title":"Cryptography"},{"key":"CIT0024","volume-title":"The Journal of Beatrix Potter from 1881 to 1897","author":"Linder L.","year":"2012"},{"key":"CIT0025","volume-title":"The Code of Love: A True Story","author":"Linklater A.","year":"2000"},{"key":"CIT0026","unstructured":"Liptai, K. Undated. Cryptography. http:\/\/www.tankonyvtar.hu\/hu\/tartalom\/tamop425\/0038_matematika_Kalman_Liptai-Cryptography\/ch02.html."},{"key":"CIT0027","volume-title":"I Know My Own Heart: The Diaries of Anne Lister, 1791\u20131840","author":"Lister A.","year":"1992"},{"key":"CIT0028","volume-title":"Love In Code","author":"McCormick D.","year":"1980"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118391857766"},{"key":"CIT0030","volume-title":"The Folger Manuscript","author":"Morris S. B.","year":"1992"},{"key":"CIT0031","doi-asserted-by":"crossref","unstructured":"Pelling, N. 2013. The Blitz Ciphers. http:\/\/www.ciphermysteries.com\/blitz-ciphers.","DOI":"10.5040\/9781784600570.40000003"},{"key":"CIT0032","unstructured":"Pelling, N. 2013. Vick Industries Cipher Mystery. http:\/\/www.ciphermysteries.com\/2013\/07\/18\/vick-industries-cipher-mystery."},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110491892755"},{"key":"CIT0034","unstructured":"Rugg, G. 2014. The Penitentia Manuscript. http:\/\/www.scm.keele.ac.uk\/research\/knowledge_modelling\/km\/people\/gordon_rugg\/cryptography\/penitentia\/."},{"key":"CIT0035","unstructured":"Rugg, G. 2014. The Ricardus Manuscript. http:\/\/www.scm.keele.ac.uk\/research\/knowledge_modelling\/km\/people\/gordon_rugg\/cryptography\/ricardus_manuscript.html."},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1080\/01611190601133539"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2013.797045"},{"key":"CIT0038","unstructured":"Schmeh, K. 2013. Codex Igo (Sloane 1360). http:\/\/scienceblogs.de\/klausis-krypto-kolumne\/codex-igo-sloane-1360\/."},{"key":"CIT0039","unstructured":"Schmeh, K. 2013. Codex Igo: Ein verschl\u00fcsseltes Buch aus dem Jahr 1571. http:\/\/scienceblogs.de\/klausis-krypto-kolumne\/2013\/12\/25\/codex-igo-ein-verschluesseltes-buch-aus-dem-jahr-1571\/."},{"key":"CIT0040","unstructured":"Schmeh, K. 2013. Der Codex Compendium: Ein (teilweise) verschl\u00fcsseltes Buch aus dem 17. Jahrhundert. http:\/\/scienceblogs.de\/klausis-krypto-kolumne\/2013\/11\/27\/der-codex-compendium-ein-teilweise-verschluesseltes-buch-aus-dem-17-jahrhundert\/."},{"key":"CIT0041","unstructured":"Schmeh, K. 2013. Der K\u00fcnstler und das verschl\u00fcsselte Notizbuch. http:\/\/www.focus.de\/wissen\/experten\/schmeh\/hampton-kryptogramme-der-kuenstler-und-das-verschluesselte-notizbuch_id_2868615.html."},{"key":"CIT0042","unstructured":"Schmeh, K. 2013. Encrypted Books (video). https:\/\/www.youtube.com\/watch?v=uZKOeFqtKs8."},{"key":"CIT0043","volume-title":"Codeknacker gegen Codemacher","author":"Schmeh K.","year":"2014","edition":"3"},{"key":"CIT0044","unstructured":"Schmeh, K. and T. Schr\u00f6del. 2013. Der Spion, der sich selbst \u00fcberlistete. http:\/\/www.spiegel.de\/einestages\/geheimes-tagebuch-aus-dem-zweiten-weltkrieg-entschluesselt-a-951102.html."},{"key":"CIT0045","volume-title":"Codex Seraphinianus","author":"Serafini L.","year":"2013"},{"key":"CIT0046","unstructured":"Stallings, D. 2004. The Secret Writing of James Hampton, African American Sculptor, Outsider Artist, Visionary. http:\/\/ixoloxi.com\/hampton\/."},{"key":"CIT0047","unstructured":"Stamp, M. 2003. Hamptonese. http:\/\/www.cs.sjsu.edu\/faculty\/stamp\/Hampton\/hampton.html."},{"key":"CIT0048","unstructured":"Szil\u00e1rd, T. 2013. \u201cAz \u0151 k\u00e9z\u00edr\u00e1s\u00e1val \u00edr\u00f3dott a szabadk\u0151m\u0171ves-sz\u00f6veg\u201d\u2014V\u00e1mos Hanna titkos\u00edr\u00e1s-kutat\u00f3 felfedez\u00e9se. http:\/\/magyarnarancs.hu\/tudomany\/az-o-kezirasaval-irodott-a-szabadkomuves-szoveg-vamos-hanna-titkosiras-kutatot-kerdeztuk-86138."},{"key":"CIT0049","unstructured":"Taylor, J. 2007. The Codex Seraphinianus. http:\/\/www.believermag.com\/issues\/200705\/?read=article_taylor."},{"key":"CIT0050","volume-title":"Samuel Pepys and His World","author":"Trease G.","year":"1972"},{"key":"CIT0051","unstructured":"V\u00e2rtejaru, M. 2014. Coded Magical Manuscript of Kassel. http:\/\/studies-vartejaru.blogspot.de\/2014\/01\/coded-magical-manuscript-of-kassel.html."},{"key":"CIT0052","unstructured":"Vasagar, J. 2013. Italian Resistance Fighter\u2018s Secret Diary Cracked by Codebreaker. http:\/\/www.telegraph.co.uk\/history\/world-war-two\/10012872\/Italian-resistance-fighters-secret-diary-cracked-by-codebreaker.html."},{"key":"CIT0053","volume-title":"\u0160ifrovan\u00fd den\u00edk Karla Hynka M\u00e1cha","author":"Va\u0161\u00e1k P.","year":"2007"},{"key":"CIT0054","unstructured":"Vir. 2013. Code. http:\/\/www.vickindustries.com\/code.html."},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119891886894"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119991887964"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2014.988369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T05:03:53Z","timestamp":1566882233000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2014.988369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,17]]},"references-count":56,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,6,11]]},"published-print":{"date-parts":[[2015,10,2]]}},"alternative-id":["10.1080\/01611194.2014.988369"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2014.988369","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}