{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:14Z","timestamp":1725485894439},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_1","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"1-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cut-&amp;-Paste Attacks with JAVA"],"prefix":"10.1007","author":[{"given":"Serge","family":"Lefranc","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"1_CR1","unstructured":"K. Hickman, The SSL Protocol, December 1995. Available electronically at: \n                    http:\/\/www.netscape.com\/newsref\/std\/ssl.html\n                    \n                   1"},{"key":"1_CR2","unstructured":"C. Horstmann and G. Cornell, Core Java, volumes 1 and 2, Sun Microsystems Press, Prentice Hall, 2000. 2"},{"key":"1_CR3","unstructured":"N. McFarlane,Professionnal Javascript, Wrox Press, 1999. 4"},{"key":"1_CR4","unstructured":"G. McGraw and E. Felten, Securing Java: getting down to business with mobile code, 2-nd edition, Wiley, 1999. 2"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"S. Oaks, Java security, O\u2019Reilly, 1998. 2","DOI":"10.1016\/S1361-3723(98)90264-0"},{"key":"1_CR6","unstructured":"E. Felten & al., Web Spoofing: An Internet Con Game, Technical Report 540-96, Princeton University, 1997. 1, 3"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:45:20Z","timestamp":1558259120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}