iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1080/01611190903030920
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T03:36:43Z","timestamp":1700192203186},"reference-count":12,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2009,9,18]]},"DOI":"10.1080\/01611190903030920","type":"journal-article","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T22:07:50Z","timestamp":1253052470000},"page":"321-334","source":"Crossref","is-referenced-by-count":5,"title":["Attacking Letter Substitution Ciphers with Integer Programming"],"prefix":"10.1080","volume":"33","author":[{"given":"Sujith","family":"Ravi","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Knight","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","volume-title":"Decrypted Secrets: Methods and Maxims of Cryptology","author":"Bauer F. L.","year":"2006"},{"key":"CIT0002","first-page":"858","volume-title":"Proceedings of the Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP\u2013CoNLL)","author":"Brants T.","year":"2007"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391867980"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.3115\/1075812.1075818"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119591883944"},{"key":"CIT0006","volume-title":"Speech and Language Processing,","author":"Jurafsky D.","year":"2006","edition":"2"},{"key":"CIT0007","first-page":"499","volume-title":"Proceedings of the Joint Conference of the International Committee on Computational Linguistics and the Association for Computational Linguistics","author":"Knight K.","year":"2006"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1080\/01611190701272369","volume":"31","author":"Olson E.","year":"2007","journal-title":"Cryptologia"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359174"},{"key":"CIT0010","volume-title":"Theory of Linear and Integer Programming","author":"Schrijver A.","year":"1998"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"Shannon C. E.","year":"1948","journal-title":"Bell System Technical Journal"},{"key":"CIT0012","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"Shannon C. E.","year":"1949","journal-title":"Bell System Technical Journal"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611190903030920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T16:14:44Z","timestamp":1558541684000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01611190903030920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,18]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,9,18]]}},"alternative-id":["10.1080\/01611190903030920"],"URL":"http:\/\/dx.doi.org\/10.1080\/01611190903030920","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,18]]}}}