{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:03:50Z","timestamp":1725458630227},"publisher-location":"Boston","reference-count":16,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402080891"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8090-5_18","type":"book-chapter","created":{"date-parts":[[2006,1,14]],"date-time":"2006-01-14T08:04:14Z","timestamp":1137225854000},"page":"247-254","source":"Crossref","is-referenced-by-count":1,"title":["How and Why More Secure Technologies Succeed in Legacy Markets"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Rosasco","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Larochelle","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"SSH, the Secure Shell: The Definitive Guide","author":"D. Barrett","year":"2001","unstructured":"Daniel Barrett and Richard E. Silverman, SSH, the Secure Shell: The Definitive Guide, USA: O\u2019Reilly & Associates, (2001)."},{"key":"18_CR2","unstructured":"Daniel Barrett and Richard E. Silverman, SSH Frequently Asked Questions, (Oct. 2000), \n                  http:\/\/www.snailbook.com\/faq\/restricted-scp.auto.html"},{"key":"18_CR3","unstructured":"Louis Bertrand, \u201cHow SSH was freed\u201d, Daemon News (Dec. 1999), \n                  http:\/\/www.daemonnews.org\/199912\/openSSH.html"},{"key":"18_CR4","unstructured":"cPanel, Inc., cPanel, \n                  http:\/\/www.cpanel.net"},{"key":"18_CR5","unstructured":"Kevin Fenzi and Dave Wreski. \u201cLinux Security HOWTO\u201d, (June 2002), \n                  http:\/\/www.tldp.org\/HOWTO\/Security-HOWTO\/index.html"},{"key":"18_CR6","unstructured":"Google, Inc. \u201cGoogle Directory: SSH Clients\u201d, (2003), \n                  http:\/\/directory.google.com\/Top\/Computers\/Security\/Products_and_Tools\/Cryptography\/SSH\/Clients\/"},{"key":"18_CR7","unstructured":"Brian Hatch, \u201cGreasing the Squeaky Wheels\u201d, IT World.com, (September 2002), \n                  http:\/\/www.itworld.com\/nl\/lnx_sec\/09172002\/"},{"key":"18_CR8","unstructured":"Jupitermedia Corporation, List of Web Hosts, (2004), \n                  http:\/\/webhosts.thelist.com\/"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Michael L. Katz and Carl Shapiro, \u201cSystems Competition and Network Effects\u201d, The Journal of Economic Perspectives, Vol 8, (Spring 1994).","DOI":"10.1257\/jep.8.2.93"},{"key":"18_CR10","unstructured":"David Larochelle and Nicholas Rosasco, Towards a Model of the Costs of Security, (May 2003), \n                  http:\/\/www.cs.virginia.edu\/larochelle\/securitycosts"},{"key":"18_CR11","unstructured":"Damien Miller, SSH tips, tricks, and protocol tutorial, (August 2002), \n                  http:\/\/www.mindrot.org\/R~djm\/auug2002\/ssh-tutorial.pdf"},{"key":"18_CR12","unstructured":"Jason Moore, personal communication, (February 2001)."},{"key":"18_CR13","unstructured":"Carl Shapiro and Hal R. Varian, Information Rules: a Strategic Guide to the Network Economy, Harvard Business School Press, (1999)."},{"key":"18_CR14","volume-title":"The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage","author":"C. Stoll","year":"1989","unstructured":"Clifford Stoll, The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage, New York: Doubleday, (1989)."},{"key":"18_CR15","unstructured":"WebHostingRank.com, Web Hosting directory list guide, \n                  http:\/\/www.webhostingrank.com\/cgi-bin\/search\/basic.cgi\n                  \n                 statistics listed as of January 2004."},{"key":"18_CR16","unstructured":"Tatu Yl\u00f6nen, Usenet posting of the SSH release announcement, (July 1995), message archived at \n                  http:\/\/groups.google.com\/groups?hl=en&lr=&ie=UTF-Uselm=YLO.95Jull2234021%40shadows.cs.hut.fi"}],"container-title":["Advances in Information Security","Economics of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8090-5_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:26:15Z","timestamp":1619555175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8090-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402080891"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8090-5_18","relation":{},"subject":[]}}